QB ClassTest2
QB ClassTest2
9. In_________ multiple large messages can quickly fill total storage capacity of an email server
A) Storage overload B) Bandwidth blocking
C) A and B D) none
10. In moblie communication,4G includes _______
A) LTE B) UMTS
C) CDMA D) CDMA2000
11. How many phases in Road map for digital forensic research
A) 5 B) 6
C) 4 D) 7
12. __________ is a tool for ethical hacking web application
A) Netsparker B) Bursuit
C) Angry IP Scanner D) GFI LanGuard
13. SNMP stands for ________
A) Single Network Management Protocol
B) Simple Network Mobile Protocol
C) Simple Network Management Protocol
D) None
14. What is the primary goal of Ethical Hacker?
A) Avoid Detection B) Hacking
C) Find Security Weakness D) Testing
15. What is the ethics behind training how to hack a system?
A)To think like hackers and know how to defend such attacks
B)To hack a system without the permission
C)To hack a network that is vulnerable
D) To corrupt software or service using malware
16. If a security audit is conducted by network administrator on internal network then it is known
as______
A) Security Testing B) Gray Box Testing
C) Black Box Testing D) White Box Testing
17. Having a member of the search team trained to handle digital evidence.
A) Can Reduce the number of people who handle the evidence
B) Can help in the presentation of the case
C) Can help in the Integrity of the evidence
D) All of these
18. Vulnerability is nothing but
A) Weakness of a system B) Strong point of a system
C) Both A) and B) D) None
19. Piggybacking onto a network through an insecure wireless configuration is a _________
A) Default windows OS Configuration
B) Weak SQL server administrator password
C) Operating system attack
D) Network Infrastructure Attack
20. __________ and _________ supports methods such as GET,PUT,POST and DELETE
A) HTTP, CoAP B) Websocket, MQTT
C) XMPP, AMQP D) NONE
46. The legal risks of ethical hacking include lawsuits due to of personal data.
a)stealing
b)disclosure
c)deleting
d)hacking
Answer: b Explanation: The legal risks of ethical hacking contains lawsuits due to disclosure
of personal data during the penetration testing phase. Such disclosure of confidential data may
lead to a legal fight between the ethical hacker and the organization.
47. Before performing any penetration test, through legal procedure, which key points listed below
is not mandatory?
a)Know the nature of the organization
b)Characteristics of work done in the firm
c)System and network
d)Type of broadband company used by the firm
Answer: d Explanation: Before performing any penetration test, through the legal procedure
the key points that the penetration tester must keep in mind are –
i) Know the nature of the organization ii) what type of work the organization do and
iii) the system and networks used in various departments and their confidential data that are
sent and received over the network.
48. An ethical hacker must ensure that proprietary information of the firm does not get leaked.
a)True
b)False
Answer: a
Explanation: Yes, it is very important for an ethical hacker to make sure that while doing
penetration tests, the confidential data and proprietary information are preserved properly and
not get leaked to the external network.
49. After performing the ethical hacker should never disclose client information to other
parties.
a)hacking
b)cracking
c)penetration testing
d)exploiting
Answer: c Explanation: It is against the laws and ethics of ethical hackers that after doing
penetration tests, the ethical hacker should never disclose client information to other parties.
The protection of client data is in the hands of the ethical hacker who performed the tests.
50. is the branch of cyber security that deals with morality and provides different theories and a
principle regarding the view-points about what is right and wrong.
a)Social ethics
b)Ethics in cyber-security
c)Corporate ethics
d)Ethics in black hat hacking
Answer: d Explanation: Ethics in cyber-security is the branch of cyber security that deals
with morality and provides different theories and principles‟ regarding the view-points about
what is right and what need not to be done.