[go: up one dir, main page]

0% found this document useful (0 votes)
15 views3 pages

Test Modulo 4

The document consists of a series of multiple-choice questions related to networking, cybersecurity, and enumeration tools. It covers topics such as client/server communication, NetBIOS enumeration, network protocols, and security laws. Each question presents four options, requiring knowledge in various technical areas to select the correct answer.

Uploaded by

victorrodrigo64c
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views3 pages

Test Modulo 4

The document consists of a series of multiple-choice questions related to networking, cybersecurity, and enumeration tools. It covers topics such as client/server communication, NetBIOS enumeration, network protocols, and security laws. Each question presents four options, requiring knowledge in various technical areas to select the correct answer.

Uploaded by

victorrodrigo64c
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Test Modulo 4

1. Of the following, which allows a client and a server to communicate in distributed


client/server Programs?
a) LDAP
b) RPC
c) VoIP
d) NTP

2. Which of the following is a NetBIOS enumeration tool?


a) WinPrint
b) WinEnumerate
c) WinOSEnum
d) Hyena

3. What port is commonly used by firewalls to allow log data traffic?


a) UDP 514
b) UDP 123
c) TCP 514
d) UDP 541

4. Which of the following is a 16 ASCII character string used to identify the network
devices over TCP/IP?
a) Hostname
b) NetBIOS name
c) OID
d) FQDN

5. Which of the following has the capability of remotely running commands on Windows
Machines?
a) PsExec
b) RemoteExec
c) WinRemExec
d) RDP

6. What is the process of extracting user names, machine names, network resources,
shares and services from a system?
a) Social engineering
b) Enumeration
c) Ethical hacking
d) Exfiltration
7. You discover an NTP server on a client’s network and are in the enumeration stage of
your pentest. Which of the following would most likely be your next step?
a) Intercept traffic from the NTP server
b) Attempt to hack into the server
c) Begin to query it for information like a list of machines on the network or internal
IP Addresses
d) Spoof the NTP server’s address and begin to intercept traffic going to the server

8. Which of the following SMTP command would not be used to enumerate user
information
a) AUTH
b) VRFY
c) EXPN
d) RCPT TO

9. Which of the following is a powerful enumeration tool?


a) PowerScan
b) Wireshark
c) SuperScan
d) EnumeraScan

10. Under what conditions does a secondary name server request a zone transfer from a
primary name server?
a) When a primary start of authority (SOA) is higher than a secondary SOA
b) When a secondary start of authority (SOA) is higher than a primary SOA
c) When a primary name server has had its service restarted
d) When a secondary name server has had its service restarted

11. Which of the following is a protocol used to manage network devices and can be used
to enumerate network resources, shares, and ARP tables?
a) DNS
b) DHCP
c) SNMP
d) TCP

12. What is it called when a hacker gathers a list of all the items found in a target range?
a) Scanning
b) Enumeration
c) Pinging
d) Hacking

13. Which of the following protocols is used for email, has no security and sends all
messages in clear text?
a) HTTP
b) SMTP
c) POP3
d) FTP
14. Having who AD-integrated external DNS Servers for the same purpose is an
unnecessary network vulnerability.
a) False
b) True

15. You are enumerating information about a windows host. Which tool would you use to
discover the host’s NetBIOS name and other NetBIOS information?
a) Nbtstatus -A 192.168.56.1
b) Nbtscan -A 192.168.56.1
c) Nbtstat -A 192.168.56.1
d) Nbtstats -A 192.168.56.1

16. IPv6 uses 128-bit addresses, which are stored in what format?
a) A 32-digit string
b) 4 groups of 8 hexadecimal digits separated by a colon
c) A 25-character field
d) 8 groups of 4 hexadecimal digits separated by a colon

17. How can an attacker best mask his or her IP address to hack a computer system
without any fear or legal repercussions?
a) HTTP Tunneling
b) Using a VPN
c) Proxy Chaining
d) SSH Tunneling

18. Which of the following protocols does not participate in the three-way handshake via
TCP?
a) TCP
b) DHCP
c) FTP
d) SMTP

19. Angela is responsible for designing, developing, testing, and evaluating information
systems throughout the system’s life cycle. In what specialty area of the “Securely
Provision” NICE Framework category does Angela Work?
a) Systems development
b) Systems Requirement Planning
c) Systems Architecture
d) Test and Evaluation

20. Infecting a classified government computer with a virus violates which federal law?
a) Electronic Communications Privacy Act
b) Computer Fraud and Abuse Act
c) CyberSecurity Enhancement Act
d) USA PATRIOT Act

You might also like