SEC504 : Hacker Tools, Techniques, Exploits and Incident Handling : Part 13

  1. Jason, a Malicious Hacker, is a student of Baker university. He wants to perform remote hacking on the server of DataSoft Inc. to hone his hacking skills. The company has a Windows-based network. Jason successfully enters the target system remotely by using the advantage of vulnerability. He places a Trojan to maintain future access and then disconnects the remote session. The employees of the company complain to Mark, who works as a Professional Ethical Hacker for DataSoft Inc., that some computers are very slow. Mark diagnoses the network and finds that some irrelevant log files and signs of Trojans are present on the computers. He suspects that a malicious hacker has accessed the network. Mark takes the help from Forensic Investigators and catches Jason.

    Which of the following mistakes made by Jason helped the Forensic Investigators catch him?

    • Jason did not perform a vulnerability assessment.
    • Jason did not perform OS fingerprinting.
    • Jason did not perform foot printing.
    • Jason did not perform covering tracks.
    • Jason did not perform port scanning.
  2. Which of the following DoS attacks affects mostly Windows computers by sending corrupt UDP packets?

    • Fraggle
    • Ping flood
    • Bonk
    • Smurf
  3. Which of the following commands can be used for port scanning?

    • nc -t
    • nc -z
    • nc -w
    • nc -g
  4. Which of the following statements are true about tcp wrappers?

    Each correct answer represents a complete solution. Choose all that apply.

    • tcp wrapper provides access control, host address spoofing, client username lookups, etc.
    • When a user uses a TCP wrapper, the inetd daemon runs the wrapper program tcpd instead of running the server program directly.
    • tcp wrapper allows host or subnetwork IP addresses, names and/or ident query replies, to be used as tokens to filter for access control purposes.
    • tcp wrapper protects a Linux server from IP address spoofing.
  5. Which of the following are types of access control attacks?

    Each correct answer represents a complete solution. Choose all that apply.

    • Spoofing
    • Brute force attack
    • Dictionary attack
    • Mail bombing
  6. Which of the following tools can be used for stress testing of a Web server?

    Each correct answer represents a complete solution. Choose two.

    • Internet bots
    • Scripts
    • Anti-virus software
    • Spyware
  7. John works as a Penetration Tester in a security service providing firm named you-are-secure Inc. Recently, John’s company has got a project to test the security of a promotional Website www.missatlanta.com and assigned the pen-testing work to John. When John is performing penetration testing, he inserts the following script in the search box at the company home page: <script>alert(‘Hi, John’)</script>

    After pressing the search button, a pop-up box appears on his screen with the text – “Hi, John.” Which of the following attacks can be performed on the Web site tested by john while considering the above scenario?

    • Replay attack
    • CSRF attack
    • Buffer overflow attack
    • XSS attack
  8. Which of the following is a technique for creating Internet maps?

    Each correct answer represents a complete solution. Choose two.

    • Active Probing
    • AS PATH Inference
    • Object Relational Mapping
    • Network Quota
  9. You work as a Network Administrator in the SecureTech Inc. The SecureTech Inc. is using Linux-based server. Recently, you have updated the password policy of the company in which the server will disable passwords after four trials. What type of attack do you want to stop by enabling this policy?

    • Brute force
    • Replay
    • XSS
    • Cookie poisoning
  10. Against which of the following does SSH provide protection?

    Each correct answer represents a complete solution. Choose two.

    • DoS attack
    • IP spoofing
    • Password sniffing
    • Broadcast storm
  11. You work as a System Administrator in SunSoft Inc. You are running a virtual machine on Windows Server 2003. The virtual machine is protected by DPM. Now, you want to move the virtual machine to another host. Which of the following steps can you use to accomplish the task? Each correct answer represents a part of the solution. Choose all that apply.

    • Remove the original virtual machine from the old server and stop the protection for the original virtual machine.
    • Run consistency check.
    • Add the copied virtual machine to a protection group.
    • Copy the virtual machine to the new server.
  12. Which of the following is executed when a predetermined event occurs?

    • Trojan horse
    • Logic bomb
    • MAC
    • Worm
  13. You enter the netstat -an command in the command prompt and you receive intimation that port number 7777 is open on your computer. Which of the following Trojans may be installed on your computer?

    • NetBus
    • QAZ
    • Donald Dick
    • Tini
  14. In which of the following methods does an hacker use packet sniffing to read network traffic between two parties to steal the session cookies?

    • Cross-site scripting
    • Physical accessing
    • Session fixation
    • Session sidejacking
  15. Victor works as a professional Ethical Hacker for SecureEnet Inc. He has been assigned a job to test an image, in which some secret information is hidden, using Steganography. Victor performs the following techniques to accomplish the task:

    1. Smoothening and decreasing contrast by averaging the pixels of the area where significant color transitions occurs.
    2. Reducing noise by adjusting color and averaging pixel value.
    3. Sharpening, Rotating, Resampling, and Softening the image.

    Which of the following Steganography attacks is Victor using?

    • Stegdetect Attack
    • Chosen-Stego Attack
    • Steg-Only Attack
    • Active Attacks
  16. Which of the following statements about Ping of Death attack is true?

    • In this type of attack, a hacker sends more traffic to a network address than the buffer can handle.
    • This type of attack uses common words in either upper or lower case to find a password.
    • In this type of attack, a hacker maliciously cuts a network cable.
    • In this type of attack, a hacker sends ICMP packets greater than 65,536 bytes to crash a system.
  17. Which of the following tools can be used as penetration tools in the Information system auditing process? Each correct answer represents a complete solution. Choose two.

    • Nmap
    • Snort
    • SARA
    • Nessus
  18. You are the Administrator for a corporate network. You are concerned about denial of service attacks. Which of the following measures would be most helpful in defending against a Denial-of-Service (DoS) attack?

    • Implement network based antivirus.
    • Place a honey pot in the DMZ.
    • Shorten the timeout for connection attempts.
    • Implement a strong password policy.
  19. Which of the following services CANNOT be performed by the nmap utility?

    Each correct answer represents a complete solution. Choose all that apply.

    • Passive OS fingerprinting
    • Sniffing
    • Active OS fingerprinting
    • Port scanning
  20. Which of the following is the process of comparing cryptographic hash functions of system executables and configuration files?

    • Shoulder surfing
    • File integrity auditing
    • Reconnaissance
    • Spoofing
Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments