Question:
Hacking and penetration?
Drea
2013-03-08 15:24:43 UTC
18. Your packet capture includes SYN packets sent to ports 1-65535 on a system from a single host. This statement is best described by which of the following terms?

a. Attacking
b. Port scanning
c. Failing to connect
d. Actively handshaking




19. Which of the following is an Internetwork layer control of the TCP/IP model?

a. Fiber cable
b. SSL
c. WPA
d. IPSec

20. Which of the following activities is the responsibility of the OSI reference model Data Link layer?

a. Physical layer connectivity
b. Flow control
c. Formatting the data
d. Delivery of IP packets
21. The main purposes for using cryptography include all but which one of the following?

a. Privacy
b. Authenticity
c. Integrity
d. Availability

22. Which of the following is an asymmetric encryption algorithm?

a. RSA
b. AES
c. IDEA
d. DES

23. Which of the following is most likely to be broken using a birthday attack?

a. DES
b. RSA
c. PKI
d. MD5

24. Which of the following best describes the purpose of the key zeroization process?

a. To encrypt asymmetric data
b. To create an MD5 hash
c. To clear media of a key value
d. To encrypt symmetric data

25. Which of the following terms best describes the main principle behind PKI?

a. Hashing
b. Established trust
c. Nonreputation
d. Availability

26. Digital signatures are used for all but which one of the following purposes?

a. Authentication
b. Nonrepudiation
c. Integrity
d. Availability



27. Key management includes all but which one of the following processes?

a. Generation
b. Storage
c. Destruction
d. Layering

28. Which of following methods is best suited in a situation where bulk encryption is required?

a. RSA
b. ECC
c. DES
d. MD5

29. Which of the following is a commonly used hashing algorithm?

a. DES
b. MD5
c. AES
d. Twofish

30. Which of the following is a cipher commonly known as a key shift cipher?

a. Vernam
b. Caesar
c. Concealment
d. Vigenere
31. Which of the following biometric authentication methods is most frequently found on laptops?

a. Retina
b. Fingerprint
c. Iris
d. Voice recognition

32. A fence that is at least __________ in height presents a psychological deterrent to most potential intruders.

a. 3 feet
b. 4 feet
c. 6 feet
d. 8 feet

33. A bollard is used as a physical security control against which of the following?

a. Humans
b. Automobiles
c. Automatic weapons
d. Natural disasters

34. When choosing between guards and dogs for physical, which of the following factors must be considered?

a. Liability
b. Discernment
c. Dual role
d. Multifunction

35. CCTV can be used as which of the following type of tools?

a. Detective only
b. Preventive only
c. Detective and reactive
d. Reactive and preventative

36. Which of the following lock grades should be selected in order to appropriately protect critical business assets?

a. Grade 4
b. Grade 2
c. Grade 1
d. Grade 3

37. Focal length defines which of the following camera qualities?

a. Degree of granularity
b. Ability to zoom
c. Scope of color
d. Horizontal and vertical view

38. If an active fax machine is discovered during an assessment, which of the following is of the least concern?

a. The phone number is publicly available.
b. The fax machine is in an open, unsecured area.
c. Faxes frequently sit in the printer tray.
d. The fax machine uses a ribbon.

39. A PIDA is an intrusion detection system used exclusively in conjunction with which of the following?

a. Doors
b. Windows
c. Guard gates
d. Fences

40. A false acceptance rate is also known as which of the following errors?

a. Type A
b. Type B
c. Type 1
d. Type 2
41. Which of the following best describes the first two steps of the footprinting process?

a. Passive information gathering
b. Active information gathering
c. Actively mapping an organization’s vulnerabilities
d. Using vulnerability scanners to map an organization

42. Which of the following examples best portrays passive information gathering?

a. Reviewing job listings posted by the targeted company
b. Port scanning the targeted company
c. Calling the company and asking questions about its services
d. Driving around the targeted company connecting to open wireless connections

43. Web resources used to footprint a company include all but which one of the following?

a. Internet archive
b. SEC EDGAR
c. Company Web site
d. Request for Comments (RFC) archive
Three answers:
Mister Answerman
2013-03-08 15:53:03 UTC
"a" to all of them and if you fail the exam, blame yourself.
2016-03-10 03:11:02 UTC
Firstly you should scan your network router.One of the best tool is penetration testing tool.It can be done by manual or automated.Once the tester gets to know the software that is running on the targeted systems, the information that the tester has can be compared with known vulnerabilities and these vulnerabilities can further be tested to see if the results support prior information.
?
2013-03-08 17:44:03 UTC
and your question is ?

sorry my homework days are over -didn't you read the assignment


This content was originally posted on Y! Answers, a Q&A website that shut down in 2021.
Continue reading on narkive:
Loading...