Ethical Hacking Chapter 2 Practice Questions

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

ICMP is disabled on the target server

An attacker has successfully compromised a machine on the network and found a server that is alive on the same network. The attacker tried to ping it but didn't get any response back. What is responsible for this scenario?

Isolate the problem

As a network administrator, Tia is experiencing intermittent security issues. What is the first thing she should do?

/22

CIDR for subnet mask 255.255.252.0

/19

CIDR notation for 255.255.224.0

Link, Internet, Transport, Application

From bottom to top, what order does the TCP/IP architecture use?

4

How many fields are there in a UDP header?

3

How many layers in the OSI model map to the top layer in the TCP/IP architecture?

Seven

Howe many layers are present in the OSI model?

Full mesh

If you needed to guarantee complete fault tolerance, which network architecture would you be most likely to use?

UDP

If you wanted a lightweight protocol to send real-rime data over, what would you use?

RFC

If you were looking for definitive documentation on a protocol, what would you consult?

/15

If you were to see the subnet mask 255.254.0.0, which CIDR notation (prefix) would you use to indicate the same thing?

Only that workstation loses its ability to communicate

In a physical star topology, what happens when a workstation loses its physical connection to another device?

Token Authentication

Jordan, a security manager, allows remote employees to login into the network via a VPN. He is concerned that a remote employee's credentials might be compromised. What will he use to mitigate the risk?

TCP

Joseph, a security analyst, analyzes the network traffic and notices that the SYN flag is set on a packet. Which protocol is in use?

SYN

Juan, a security administrator, wants to analyze a packet trace and identify the packets associated with a new TCP connection. Which of the following flags will be set on the first packet for initiating a new connection?

SYN/ACK

Kylie and Taylor work as security administrators at XYZ. Kylie sends the SYN packet to Taylor in a TCP connection. Which packet does Taylor send back in response to Kylie?

IPSec

Laura works as a security engineer at XYZ. She has been asked to deploy a secure remote access solution that will allow employees to connect to the company's internal network. Which will she implement to minimize the opportunity for the man-in-the-middle attack to occur?

Replace SSL with TLS

Laura, a vulnerability tester, runs a Nessus vulnerability scan of her network and discovers systems running SSL 3.0. What action should she take to remediate this vulnerability?

Always, Never

MAC addresses are ____ local on the LAN and ____ go through or past a router (always/never)

Performing local network addressing

The MAC Address is used for which purpose?

Destination port, source port, checksum, and length

The UDP headers contain which fields?

Colons

The common format of a MAC address is 6 octets (8-bit bytes) generally separated by __________.

Segment

The protocol data unit (PDU) for the Transmission Control Protocol (TCP) is called a _________.

SYN, SYN/ACK, ACK

What are the messages sent as part of a TCP handshake?

TTL

What is a value for the period of time that a packet, or data, should exist on a computer or network before being discarded?

SYN, SYN/ACK, ACK

What is the TCP handshake as described by the flags set?

There is no defined response

What is the defined response to a connection request to a closed UDP port according to the protocol specification?

Better performance

What is the primary advantage of using a switch over a hub?

10.0.0.0-10.255.255.255, 172.16.0.0-172.31.255.255, and 192.168.0.0-192.168.255.255

What is the range for private addresses?

Packet reassembly

What is the use of the IP identification header field?

CIDR

What is used to provide the number of bits in a network prefix?

ff:ff:ff:ff:ff:ff

What represents the broadcast Media Access Control (MAC) address?

/29

Which CIDR does the subnet mask 255.255.255.248 represent?

TTL

Which IP header field indicates how long a message can live on the network before it is considered to be expired?

PaaS

Which cloud-based service model offers customers a platform on which they can develop, run, and manage their applications and services?

Subnet Mask

Which essential information is used to determine whether a destination system is on the same network as the source?

PSH

Which flag is used by a TCP scan to direct the sending system to send buffered data?

IP Identification

Which header field is used to reassemble fragmented IP packets?

UDP Source Port

Which information would a packet filter use to make decisions about what traffic to allow into the network?

Layer 4

Which layer of the OSI model takes care of segmenting messages for transmission?

Star

Which logical topology is commonly used in ethernet networks that use a switch?

Traceroute

Which network diagnostics utility does not work without the use of ICMP?

Star-bus hybrid

Which network topology are you MOST likely to run across in a large enterprise network?

Session

Which of the following layers manages the communication between the endpoints when it comes to maintaining the communication of the applications (the client or server)?

IMP

Which of the following refers to a large computer with specialized interfaces acting as a message gateway?

iCloud

Which of these services would be considered "storage as a service" solution? Microsoft Azure iCloud Google Compute Drop-Leaf

IPSec

Which protocol is a collection of extensions that allow you to encrypt data as it travels from one location to another?

ICMP

Which protocol is necessary to enable the functionality of traceroute?

HTTP

Which protocol would be used to communicate with an IoT device?

TCP

Which protocol would you use for transport if you needed to ensure that all your messages were received and in the correct order?

255.255.128.0

Which subnet mask would you use if the bit pattern was 11111111 11111111 10000000 00000000?

Bus

Which topology consists of a single network cable to which every device on the network connects?

Bus

Your organization has asked you to connect all the computers to a single backbone. Which topology will you use?

Token

Your organization wants to ensure that anyone who has the right to authenticate himself should enter a password, which changes every 40 seconds. Which of the following identification and authentication techniques will the organization select to accomplish this task?

ICMP

oe, a penetration tester, wants to identify the availability of a remote system by sending ping requests out from the company's network. Which protocol will he use to accomplish the task?

/21

CIDR for subnet mask 255.255.248.0

32

A company is using an IPv4 address for the internal network. What represents a valid length in bits of an address that can be used?


संबंधित स्टडी सेट्स

SBE Refresher 1 - Privacy and Confidentiality

View Set

The 9 Worst Breakups of all Time

View Set

Cost Leadership & Differentiation

View Set

chapter 10 quality management and six sigma

View Set

MktFund: Ch 1 What is Marketing?

View Set

Chapter 9 - Lifespan Development

View Set