Which one attack-based check Web Inspect cannot do?
(A). cross-site scripting
(B). injecting shell code
(C). parameter injection
(D). directory traversal
(E). All of the above
Answer: (B). injecting shellcode
Select the password recovery and auditing tool.
(A). LC3
(B). Network Stumbler
(C). LC4
(D) .Maltego
(E). both a and b
Answer: c). LC4
In 3-2-1 rule 2 Show _________?
(A). copies of our data
(B). off-site backup
(C). different formats
(D). None of the above
(E). All of the above
Answer : (B). off-site backup
Select the process that is used for keeping data at a secure place for long-term storage.
(A). Disposal of Data
(B). Archival Storage
(C). Data archiving
(D). Backup
(E). both a and c
Answer :(C). Data archiving
Select from the following that is not a form of data archiving?
(A). Storage archiving
(B). Offline
(D). Cloud-storage
(E). none of these
Answer : (A). Storage archiving
Select the example of archives online.
(A). dedicated archive server
(B). document files
(C). On removable media
(D). DVD drives
(E). none of these
Answer: (A). dedicated archive server
Select from the following that will not help us for the secure disposal of data?
(A). Destroy the data
(B). Destroy access
(C). Keep careful records
(D). Destroy the device
(E). none of these
Answer : (B). Destroy access
Select from the following data security consideration.
(A). Disposal of Data
(B). Archival Storage
(C). Backups
(D). Both a and c
(E). All of the above
Answer : (E). All of the above
Which one is the most used rule for backup.
(A). 4-2-1 Rule
(B). 4-3-2 Rule
(C). 3-2-1 Rule
(D). 4-3-1 Rule
(E). none of these
Answer : (C). 3-2-1 Rule
Which framework produce cracking of vulnerabilities easy like point and click.(
(A). Zeus
(B). Metasploit
(C). .Net
(D). Ettercap
(E). both a and b
Answer: (A). Zeus
Select the popular tool used to find networks as well as in security auditing.
(A). Ettercap
(B). Nmap
(C). Metasploit
(D). Burp Suit
(E). none of these
Answer: (B) Nmap
Select the Nmap that does not check?
(A). services different hosts are offering
(B). what type of antivirus is in use
(C). what kind of firewall is in use
(D). on what OS they are running
(E). Both a and b
Answer: (B) what type of antivirus is in use
Which one is interacting with network intrusion detection and real-time traffic analysis.
(A). Snort
(B). L0phtCrack
(C). John the Ripper
(D). Nessus
(E). none of these
Answer: (A) Snort
Wireshark is a?.
(A). connection analysis network
(B). network connection security
(C). protocol analysis
(D). defending malicious packet-filtering
(E). none of these
Answer: (B). network connection security
Which tool is used for Wi-Fi hacking?
(A). Wireshark
(B). Snort
(C). Aircrack-ng
(D). Nessus
(E). none of these
Answer: (B). Snort
Select the use of Aircrack-ng.
(A). Firewall bypassing
(B). Packet filtering
(C). Wi-Fi attacks
(D). System password cracking
(E). none of these
Answer: (C). Wi-Fi attacks
Select the popular IP address and port scanner.
(A). Angry IP Scanner
(B). Snort
(C). Cain and Abel
(D). Ettercap
(E). All of these
Answer: (A). Angry IP Scanner
Which tool used for network analysis in the multi-protocol diverse network.
(A). Snort
(B). EtterPeak
(D). SuperScan
(E). both a and b
Answer: (B). EtterPeak
Select that used to scans TCP ports and resolves various hostnames.
(A). Ettercap
(B). Snort
(C). SuperScan
(D). QualysGuard
(E). none of these
r
Answer: (C). SuperScan
Select the web application assessment security tool.
(A). LC4
(B). Ettercap
(C). WebInspect
(D). QualysGuard
(E). none of these
Answer: (C). WebInspect