Computer networking

   1) Which of the aftercited are Penetration proofing methodology?  A. White box model B. Black box model C. Gray box model D. All of the above 2) Which of the aftercited skills are wanted to be a guarantee proofer?  A. Knowledge of network and computer technology B. Force to promulgate after a while skill and IT personnel C. An mind of the laws in your residuum and force to use expedient hirelings D. All of the above 3) Which of the aftercited are the bounds flake of TCP/IP?  A. Network and Internet B. Transport and Application C. Network, Internet, Transport, Presentation D. A and B 4) Which of the afterciteds are the TCP section faints?  A. SYN faint: synch faint , ACK faint: reception faint B. PSH faint: urge faint, URG faint: grave faint, STF faint: set proof faint C. PSH faint: urge faint, URG faint: grave faint, RST faint: reset faint, FIN faint: accomplish faint D. A and C 5) Which of the aftercited are properties of User Datagram Protocol (UDP)?  A. Fast but fabulous introduction protocol and Operates on Transport flake B. Used for press but Does not want to identify receiver is listening or ready C. Depends on surpassing flakes of TCP/IP stack treat problems and Referred to as a addionless protocol D. All of the above 6) Distributed denial-of-service (DDoS) invasion is:  A. Invasion on number from unmarried servers or workstations and Network could be flooded after a while billions of packets that causes Dropping of bandwidth and Degradation or dropping of press B. Invasion on number from multiple servers or workstations and Network could be flooded after a while billions of packets that causes Dropping of bandwidth and Degradation or dropping of press C. Invasion on server from multiple number or workstations and Network could be flooded after a while billions of packets causes Dropping of bandwidth and Degradation or dropping of press D. None of the above 7) Divergent categories of Attacks are:  A. Denial-of-Service (DoS), Distributed Denial-of-Service (DDoS), Buffer inundation B. Ping of Death, Gathering hijacking C. Denial-of-Service (DoS), Distributed Denial-of-Service (DDoS), Buffer inundation, Ping of Death, Port High jacking (PoH) D. A and B 8) Which of the aftercited are Social Engineering Tactics?  A. Persuasion, Intimidation, Coercion B. Persuasion, Intimidation, Coercion, Extortion, blackmailing C. Persuasion, Intimidation, Coercion, Extortion, Urgency D. All of the above 9) Which of the aftercited/s are types of Port Scans?  A. ACK vision, FIN vision, UDP vision B. SYN vision, NULL vision, XMAS vision,  C. ACK vision, FIN vision, UDP vision, SYN vision, NULL vision, XMAC vision D. A and B 10) Enumeration extracts counsel about:  A. Resources or shares on the network B. Usernames or groups assigned on the network C. User’s password and novel logon times D. All of the above 11) Which of the aftercited are NetBIOS Enumeration Tools?  A. Nbtstat bid, Net vision bid, Net use bid B. Nbtstat bid, Net vision bid, Dumpsec bid C. Nbtstat bid, Net vision bid, Hyena bid D. None of the above 12) Dumsec is an Enumeration hireling for Windows plans that does the aftercited/s:  A. Allows user to add to a server and “dump”, Permissions for shares, Permissions for printers B. Permissions for the Registry, Users in post or consideration format, Policies ,Rights, Services C. Allows user to add to a server and “dump”, Permissions for shares, Permissions for printers and Permissions for the Registry, Users in post or consideration format D. A and B 13) Which of the aftercited are Tools for enumerating Windows targets?  A. Nbtstat, Net vision, Net use B. Nbtstat, Net vision, Net use and Other utilities C. Nbtstat, Net vision, Net use, Nessus D. All of the above 14) Which of the aftercited statements is more obsequious about Windows OS?  A. Many Windows OSs accept solemn vulnerabilities B. None of the Windows OSs accept any solemn vulnerabilities C. A few Windows OSs accept any solemn vulnerabilities D. All of the Windows OSs accept any solemn vulnerabilities 15) Which of the aftercited best describes Heterogeneous Procedure Call?  A. Allows a program vulgar on one number to run regulation on a heterogeneous number B. Allows a program vulgar on one server to run regulation on another server C. Allows a program vulgar any server to run regulation on a determined clinet D. None of the above 16) Buffer Overflows occurs when:  A. Postulates is written to a buffer and corrupts postulates in perpetuation straightforward to allocated buffer B. Normally, occurs when mimicking strings of characters from one buffer to another C. Postulates is deleted from  a buffer and corrupts postulates in perpetuation straightforward to deleted buffer D. A and B 17) Microsoft Baseline Guarantee Analyzer (MBSA) is worthy of checking which of the aftercited/s?  A. Patches, Guarantee updates, Configuration fallacys B. Blank or imbecile passwords C. A and B D. None of the above 18) Which of the aftercited/s are Vulnerabilities in Windows perfect plans? A. Lack of ACL livelihood in FAT and Risk of vindictive ADSs in NTFS B. RCP, NetBIOS, SMB, Null gatherings C. Windows Web services and IIS D. All of the above 19) An Embedded plan is:  A. Any computer plan that is a general-purpose PC or server and they are in all networks and Transact vital functions B. Any computer plan that isn’t a general-purpose PC or server and they are in all networks and Transact vital functions C. Any computer plan that isn’t a server or client D. None of the above 20) Goal Linking and Embedding Database are Set of interfaces that:   A. Enable contacts to way postulates stored in DBMS and relies on addion strings and sanctions contact to way postulates stored on apparent device B. Enable contacts to way postulates stored in a server and relies on addion tokens and sanctions contact to way postulates stored on apparent device C. Enable contacts to way postulates stored in tasteless perfects D. All of the above 21) ActiveX Postulates Objects are:  A. Programming interface for adding Web contacts to a postulatesbase B. Defines a set of technologies that sanction desktop contacts to interact after a while Web C. Network interface for adding Web contacts to a postulatesbase D. A and B 22) Attackers considerable a Web server can do which of the aftercited/s?  A. Deface the Web residence and waste company’s postulatesbase or retail contents B. Gain guide of user accounts and transact subordinate invasions  C. Gain commencement way to other contact servers D. All of the above 23) Which of the aftercited/s are Web contact vulnerabilities?  A. Cross-residence scripting (XSS) flaws and Injection flaws and vindictive perfect deterrent and Unsecured straightforward goal reference B. Cross-residence beseech falsification (CSRF) and Counsel leakage and inaccurate fallacy handling and Broken verification and gathering skill C. Unsecured cryptographic storage and Unsecured notice and Failure to imprison URL way D. All of the above 24) Which of the aftercited statements best describes Wireless Hacking?  A. Hacking a wireless network is divergent from hacking a wired Lan and Port visionning and Enumeration techniques can not be used. B. Hacking a wireless network is not considerable divergent from hacking a wired LAN and Port visionning and Enumeration techniques can be used. C. Hacking a wireless network is not considerable divergent from hacking a wired LAN and Port visionning technique can be used D. All of the above 25) Cryptography is:  A. Process of converting plaintext into ciphertext B. Process of converting ciphertext into plaintext  C.  Process of converting plaintext into ciphertext and vise versa D. All of the above 26) Which of the aftercited statements is penny?  A. Cryptography is a new technology B. Cryptography has been encircling for thousands of years C. Cryptography has been encircling for hundreds of years D. None of the above 27) Which of the aftercited best describes Hashing Algorithms?  A. Takes a variable-length notice and produces a fixed-length rate (i.e., notice incorporate), Like a fingerprint of the notice B. Takes a variable-length notice and produces a fixed-length rate (i.e., notice incorporate), Like a fingerprint of the notice, If notice is alterable, hash rate changes C. Takes a fixed-length notice and produces a variable-length rate (i.e., notice incorporate), Like a fingerprint of the notice, If notice is alterable, hash rate changes D. B and C