Technical :: All Aptitude Test ::

Hassan
1. What type of symmetric key algorithm using a streaming cipher to encrypt information?
A. RC4
B. Blowfish
C. SHA
D. RC4

2.Which of the following is not a factor in securing the environment against an attack on security?
A. The education of the attac The system configurationker
B. The system configuration
C. The network architecture
D. The education of the attac The system configurationker

3.What type of attack uses a fraudulent server with a relay address?
A. NTLM
B. MITM
C. NetBIOS
D. NTLM

4.What port is used to connect to the Active Directory in Windows 2000?
A. 80
B. 445
C. 139
D. 80

5. To hide information inside a picture, what technology is used?
A. Rootkits
B. Bitmapping
C. Steganography
D. Rootkits

6. Which phase of hacking performs actual attack on a network or system?
A. Reconnaissance
B. Maintaining Access
C. Scanning
D. Reconnaissance

7.Attempting to gain access to a network using an employee’s credentials is called the _____________ mode of ethical hacking.
A. Local networking
B. Social engineering
C. Physical entry
D. Local networking

8.Which Federal Code applies the consequences of hacking activities that disrupt subway transit systems?
A. Electronic Communications Interception of Oral Communications
B. 18 U.S.C. § 1029
C. Cyber Security Enhancement Act 2002
D. Electronic Communications Interception of Oral Communications

9.Which of the following is not a typical characteristic of an ethical hacker?
A. Excellent knowledge of Windows.
B. Understands the process of exploiting network vulnerabilities.
C. Patience, persistence and perseverance.
D. Excellent knowledge of Windows.

10.What is the proper command to perform an Nmap XMAS scan every 15seconds?
A. nmap -sX -sneaky
B. nmap -sX -paranoid
C. nmap -sX -aggressive
D. nmap -sX -sneaky

11.What type of rootkit will patch, hook, or replace the version of system call in order to hide information?
A. Library level rootkits
B. Kernel level rootkits
C. System level rootkits
D. Library level rootkits

12.What is the purpose of a Denial of Service attack?
A. Exploit a weakness in the TCP/IP stack
B. To execute a Trojan on a system
C. To overload a system so it is no longer operational
D. Exploit a weakness in the TCP/IP stack

13.What are some of the most common vulnerabilities that exist in a network or system?
A. Changing manufacturer, or recommended, settings of a newly installed application.
B. Additional unused features on commercial software packages.
C. Utilizing open source application code
D. Changing manufacturer, or recommended, settings of a newly installed application.

14.What is the sequence of a TCP connection?
A. SYN-ACK-FIN
B. SYN-SYN ACK-ACK
C. SYN-ACK
D. SYN-ACK-FIN

15. What tool can be used to perform SNMP enumeration?
A. DNSlookup
B. Whois
C. Nslookup
D. DNSlookup

16. Which ports should be blocked to prevent null session enumeration?
A. Ports 120 and 445
B. Ports 135 and 136
C. Ports 110 and 137
D. Ports 120 and 445

17.The first phase of hacking an IT system is compromise of which foundation of security?
A. Availability
B. Confidentiality
C. Integrity
D. Availability

18.How is IP address spoofing detected?
A. Installing and configuring a IDS that can read the IP header
B. Comparing the TTL values of the actual and spoofed addresses
C. Implementing a firewall to the network
D. Installing and configuring a IDS that can read the IP header

19.Why would a ping sweep be used?
A. To identify live systems
B. To locate live systems
C. To identify open ports
D. To identify live systems

20.What are the port states determined by Nmap?
A. Active, inactive, standby
B. Open, half-open, closed
C. Open, filtered, unfiltered
D. Active, inactive, standby

21.What port does Telnet use?
A. 22
B. 80
C. 20
D. 22

22.Which of the following will allow footprinting to be conducted without detection?
A. PingSweep
B. Traceroute
C. War Dialers
D. PingSweep

23.Performing hacking activities with the intent on gaining visibility for an unfair situation is called ________?
A. Cracking
B. Analysis
C. Hacktivism
D. Cracking

24.What is the most important activity in system hacking?
A. Information gathering
B. Cracking passwords
C. Escalating privileges
D. Information gathering

25. A packet with no flags set is which type of scan?
A. TCP
B. XMAS
C. IDLE
D. TCP

26.How many messages will HQTTP will send in 1024?
A. 256
B. 514
C. 240
D. 256

27. How many messages will HTTP will send per hour?
A. 1,708
B. 160,278
C. 3,628
D. 1,708

28.What does HTTP do?
A. Enables network resources and reduces perception of latency
B. Reduces perception of latency and allows multiple concurrency exchange
C. Allows multiple concurrent exchange and enables network resources
D. Enables network resources and reduces perception of latency

29.A request from client is basically made of ______?
A. Method
B. Task
C. Event
D. Method

30.Response is made up of a ________ status code.?
A. two-digit
B. three-digit
C. five-digit
D. two-digit


Date to Date Current Affairs 2022

PakMCQs.net

Quick Links

GAT Subject



   Computer Science    English Mcqs    Agriculture    

Engineering



   Computer Science    Civil Engineering    

Technical



   Networking    Electronics    Database    

Past Papers



   Model Papers    FPSC Papers