INT 244 UNIT 04 MCQs

0

Sniffers, Social Engineering & Denial of Service

INT244
Sniffers, Social Engineering & Denial of Service


Sniffers :-


1. On a switch, each switchport represents a ____________.

A. VLAN

B. Broadcast domain

C. Host

D. Collision domain ✔️


2. Wireless access points function as a ____________.

A. Hub ✔️

B. Bridge

C. Router

D. Repeater 


3. What mode must be configured to allow an NIC to capture all traffic on the wire?

A. Extended mode

B. 10/100

C. Monitor mode

D. Promiscuous mode ✔️


4. Which of the following prevents ARP poisoning?

A. ARP Ghost

B. IP DHCP Snooping ✔️

C. IP Snoop

D. DNSverf


5. Jennifer is a system administrator who is researching a technology that will secure

network traffic from potential sniffing by unauthorized machines. Jennifer is not

concerned with the future impact on legitimate troubleshooting. What technology can

Jennifer implement?

A. SNMP

B. LDAP

C. SSH ✔️

D. FTP


6. MAC spoofing applies a legitimate MAC address to an unauthenticated host, which

allows the attacker to pose as a valid user. Based on your understanding of ARP, what

would indicate a bogus client?

A. The MAC address doesn’t map to a manufacturer.

B. The MAC address is two digits too long.

C. A reverse ARP request maps to two hosts. ✔️

D. The host is receiving its own traffic.


7. Bob is attempting to sniff a wired network in his first pen test contract. He sees only

traffic from the segment he is connected to. What can Bob do to gather all switch

traffic?

A. MAC flooding ✔️

B. MAC spoofing

C. IP spoofing

D. DOS attack


8. What technique funnels all traffic back to a single client, allowing sniffing from all

connected hosts?

A. ARP redirection

B. ARP poisoning ✔️

C. ARP flooding

D. ARP partitioning


9. Which Wireshark filter displays only traffic from 192.168.1.1?

A. ip.addr =! 192.168.1.1

B. ip.addr ne 192.168.1.1

C. ip.addr == 192.168.1.1 ✔️

D. ip.addr – 192.168.1.1


10. What common tool can be used for launching an ARP poisoning attack?

A. Cain & Abel ✔️

B. Nmap

C. Scooter

D. Tcpdump


11. Which command launches a CLI version of Wireshark?

A. Wireshk

B. dumpcap

C. tshark ✔️

D. editcap


12. Jennifer is using tcpdump to capture traffic on her network. She would like to save the

capture for later review. What command can Jennifer use?

A. tcpdump –r capture.log

B. tcpdump – l capture.log

C. tcpdump –t capture.log

D. tcpdump –w capture.log ✔️


13. What is the generic syntax of a Wireshark filter?

A. protocol.field operator value ✔️

B. field.protocol operator value

C. operator.protocol value field

D. protocol.operator value field


14. Tiffany is analyzing a capture from a client’s network. She is particularly interested in

NetBIOS traffic. What port does Tiffany filter for?

A. 123

B. 139 ✔️

C. 161

D. 110


16. Jennifer is using tcpdump to capture traffic on her network. She would like to review a

capture log gathered previously. What command can Jennifer use?

A. tcpdump –r capture.log ✔️

B. tcpdump – l capture.log

C. tcpdump –t capture.log

D. tcpdump –w capture.log


17. Wireshark requires a network card to be able to enter which mode to sniff all network

traffic?

A. Capture mode

B. Promiscuous mode ✔️

C. Pcap mode

D. Gather mode


18. Which network device can block sniffing to a single network collision domain, create

VLANs, and make use of SPAN ports and port mirroring?

A. Hub

B. Switch ✔️

C. Router

D. Bridge


19. What device will neither limit the flow of traffic nor have an impact on the

effectiveness of sniffing?

A. Hub ✔️

B. Router

C. Switch

D. Gateway


20. The command-line equivalent of WinDump is known as what?

A. Wireshark

B. Tcpdump ✔️

C. WinDump

D. Netstat


Social Engineering :-


1. Phishing takes place using __________.

A. Instant messaging

B. Email ✔️

C. Websites

D. Piggybacking


2. Training and education of end users can be used to prevent __________.

A. Phishing ✔️

B. Tailgating/piggybacking ✔️

C. Session hijacking

D. Wireshark


3. Social engineering can be thwarted using what kinds of controls?

A. Technical ✔️

B. Administrative ✔️

C. Physical ✔️

D. Proactive controls


4. Social engineering preys on many weaknesses, including __________.

A. Technology ✔️

B. People ✔️

C. Human nature ✔️

D. Physical ✔️


5. Social engineering can use all the following except __________.

A. Mobile phones

B. Instant messaging

C. Trojan horses

D. Viruses ✔️


6. Social engineering is designed to __________.

A. Manipulate human behavior ✔️

B. Make people distrustful

C. Infect a system

D. Gain a physical advantage


7. Phishing can be mitigated through the use of __________.

A. Spam filtering ✔️

B. Education

C. Antivirus

D. Anti-malware


8. Which mechanism can be used to influence a targeted individual?

A. Means of dress or appearance ✔️

B. Technological controls

C. Physical controls

D. Training


9. Jennifer receives an email claiming that her bank account information has been lost

and that she needs to click a link to update the bank’s database. However, she doesn’t

recognize the bank, because it is not one she does business with. What type of attack

is she being presented with?

A. Phishing ✔️

B. Spam

C. Whaling

D. Vishing


10. What is the best option for thwarting social-engineering attacks?

A. Technology

B. Training ✔️

C. Policies

D. Physical controls


11. Janet receives an email enticing her to click a link. But when she clicks this link she is

taken to a website for her bank, asking her to reset her account info. However, Janet

noticed that the bank is not hers and the website is not for her bank. What type of

attack is this?

A. Whaling

B. Vishing

C. Phishing ✔️

D. Piggybacking


12. Jason receives notices that he has unauthorized charges on his credit card account.

What type of attack is Jason a victim of?

A. Social engineering

B. Phishing

C. Identity theft ✔️

D. Bad luck


13. A security camera picks up someone who doesn’t work at the company following

closely behind an employee while they enter the building. What type of attack is

taking place?

A. Phishing

B. Walking

C. Gate running

D. Tailgating ✔️


14. What is a vulnerability scan designed to provide to those executing it?

A. A way to find open ports

B. A way to diagram a network

C. A proxy attack

D. A way to reveal vulnerabilities ✔️


15. In social engineering a proxy is used to __________.

A. Assist in scanning

B. Perform a scan

C. Keep an attacker’s origin hidden ✔️

D. Automate the discovery of vulnerabilities


16. Social engineering can be used to carry out email campaigns known as __________.

A. Spamming

B. Phishing ✔️

C. Vishing 

D. Splashing


17. Human beings tend to follow set patterns and behaviors known as __________.

A. Repetition

B. Habits ✔️

C. Primacy

D. Piggybacking


18. When talking to a victim, using __________ can make an attack easier.

A. Eye contact

B. Keywords ✔️

C. Jargon

D. Threats


19. An attacker can use which technique to influence a victim?

A. Tailgating

B. Piggybacking

C. Name-dropping ✔️

D. Acting like tech support


20. Jason notices that he is receiving mail, phone calls, and other requests for

information. He has also noticed some problems with his credit checks such as bad

debts and loans he did not participate in. What type of attack did Jason become a

victim of?

A. Social engineering

B. Phishing

C. Identity theft ✔️

D. Bad luck


Denial of Service :-


1. What is the hexadecimal value of a NOP instruction in an Intel system?

A. 0x99

B. 0x90 ✔️

C. 0x80

D. 99x0


2. Which pointer in a program stack gets shifted or overwritten during a successful

overflow attack?

A. ESP

B. ECP

C. EIP ✔️

D. EBP


3. Groups and individuals who hack systems based on principle or personal beliefs are

known as ___________.

A. White hats

B. Black hats

C. Script kiddies

D. Hacktivists ✔️


4. Jason is the local network administrator who has been tasked with securing the

network from possible DoS attacks. Within the last few weeks, some traffic logs

appear to have internal clients making requests from outside the internal LAN. Based

on the traffic Jason has been seeing, what action should he take?

A. Throttle network traffic.

B. Update antivirus definitions.

C. Implement egress filtering.

D. Implement ingress filtering. ✔️


5. Which DoS attack sends traffic to the target with a spoofed IP of the target itself?

A. Land ✔️

B. Smurf

C. Teardrop

D. SYN flood


6. Adding to and removing from a program stack are known as what?

A. Pop and lock

B. Push and pop ✔️

C. Stack and pull

D. Plus and minus


7. Zombies Inc. is looking for ways to better protect their web servers from potential DoS

attacks. Their web admin proposes the use of a network appliance that receives all

incoming web requests and forwards them to the web server. He says it will prevent

direct customer contact with the server and reduce the risk of DoS attacks. What

appliance is he proposing?

A. Web proxy

B. IDS

C. Reverse proxy ✔️

D. Firewall


8. In a DDoS attack, what communications channel is commonly used to orchestrate the

attack?

A. Internet Relay Chat (IRC) ✔️

B. MSN Messenger

C. ICMP 

D. Google Talk


9. What is the name for the dynamic memory space that, unlike the stack, doesn’t rely on

sequential ordering or organization?

A. Pointer

B. Heap ✔️

C. Pile

D. Load


10. Which function(s) are considered dangerous because they don’t check memory

bounds? (Choose all that apply.)

A. gets() ✔️

B. strcpy() ✔️

C. scanf() ✔️

D. strcat() ✔️


11. The stack operates on _______ a basis.

A. FIFO

B. LIFO ✔️

C. FILO

D. LILO


13. What is a single-button DDoS tool suspected to be used by groups such as

Anonymous?

A. Trinoo

B. Crazy Pinger

C. LOIC ✔️

D. DoSHTTP


14. What is an eight-in-one DoS tool that can launch such attacks as land and teardrop?

A. Jolt

B. Targa ✔️

C. TFN2K

D. Trinoo


15. What command-line utility can you use to craft custom packets with specific flags set?

A. Nmap

B. Zenmap

C. Ping

D. hping3 ✔️


16. What protocol is used to carry out a fraggle attack?

A. IPX

B. TCP

C. UDP ✔️

D. ICMP


17. What is the key difference between a smurf and a fraggle attack?

A. TCP vs. UDP ✔️

B. TCP vs. ICP

C. UDP vs. ICMP

D. TCP vs. ICMP


18. What is the main difference between DoS and DDoS?

A. Scale of attack

B. Number of attackers ✔️

C. Goal of the attack

D. Protocols in use


19. What is the most common sign of a DoS attack?

A. Weird messages

B. Rebooting of a system

C. Slow performance ✔️

D. Stolen credentials


20. What response is missing in a SYN flood attack?

A. ACK ✔️

B. SYN

C. SYN-ACK

D. URG


Post a Comment

0Comments
Post a Comment (0)

#buttons=(Accept !) #days=(20)

Our website uses cookies to enhance your experience. Learn More
Accept !
✨ Updates