
- •10. What is Encryption algorithm?
- •35. Which of these is not considered as a symmetric-key algorithm?
- •36. Which of the following statement(s) is(are) properties of public-key encryption?
- •59. A function that is easily computed, and the calculation of its inverse is infeasible unless certain privileged information is known.
- •60. A form of cryptosystem in which encryption and decryption are performed using the same key. Also known as conventional encryption.
- •61. What is Hacking?
- •62. What is Cracking?
- •63. What is Phreaking?
- •71. Which of the following statements is the definition of ip Spoofing – Source Routing?
- •72. Which of the following statements is the definition of e-mail Spoofing?
- •73. Which of the following statements is the definition of Session Hijackig?
- •82. One of the most famous documented dDoS attacks Back. How does the Back work?
- •83. One of the most famous documented dDoS attacks CrashIis. How does the CrashIis work?
- •84. One of the most famous documented dDoS attacks Land. How does the Land work?
- •85. One of the most famous documented dDoS attacks Mailbomb. How does the Mailbomb work?
- •87. In Magic Square cipher what will be the value of magic constant or magic sum m if the key is 17? 2465
- •89. What is Data integrity?
71. Which of the following statements is the definition of ip Spoofing – Source Routing?
A. Attacker uses IP address of another computer to acquire information or gain access.
B. Attacker spoofs the IP address of another machine and inserts itself between the attacked machine and the spoofed machine to intercept replies.
C. Attacker sends messages masquerading as someone else.
D. Web Site maintains authentication so that the user does not have to authenticate repeatedly
E. Process of taking over an existing active session.
72. Which of the following statements is the definition of e-mail Spoofing?
A. Attacker uses IP address of another computer to acquire information or gain access.
B. Attacker spoofs the IP address of another machine and inserts itself between the attacked machine and the spoofed machine to intercept replies.
C. Attacker sends messages masquerading as someone else.
D. Web Site maintains authentication so that the user does not have to authenticate repeatedly
E. Process of taking over an existing active session.
73. Which of the following statements is the definition of Session Hijackig?
A. Attacker uses IP address of another computer to acquire information or gain access.
B. Attacker spoofs the IP address of another machine and inserts itself between the attacked machine and the spoofed machine to intercept replies.
C. Attacker sends messages masquerading as someone else.
D. Web Site maintains authentication so that the user does not have to authenticate repeatedly
E. Process of taking over an existing active session.
74. Which attack takes advantage of the way in which information is stored by computer programs?
A. Buffer overflow attacks
B. DDos Attack
C. Spoofing
D. Session Hijacking
E. None of the statements
75. How does the Dictionary attack work?
A. Hacker tries all words in dictionary to crack password
B. Try all permutations of the letters and symbols in the alphabet
C. Words from dictionary and their variations used in attack
D. People dump their trash papers in garbage which may contain information to crack passwords
E. People write passwords in different places and disclose passwords naively to others
76. How does the Brute Force attack work?
A. Hacker tries all words in dictionary to crack password
B. Try all permutations of the letters and symbols in the alphabet
C. Words from dictionary and their variations used in attack
D. People dump their trash papers in garbage which may contain information to crack passwords
E. People write passwords in different places and disclose passwords naively to others
77. How does the Hybrid attack work?
A. Hacker tries all words in dictionary to crack password
B. Try all permutations of the letters and symbols in the alphabet
C. Words from dictionary and their variations used in attack
D. People dump their trash papers in garbage which may contain information to crack passwords
E. People write passwords in different places and disclose passwords naively to others
78. How does the Social Engineering work?
A. Hacker tries all words in dictionary to crack password
B. Try all permutations of the letters and symbols in the alphabet
C. Words from dictionary and their variations used in attack
D. People dump their trash papers in garbage which may contain information to crack passwords
E. People write passwords in different places and disclose passwords naively to others
79. How does the Dumpster Diving work?
A. Hacker tries all words in dictionary to crack password
B. Try all permutations of the letters and symbols in the alphabet
C. Words from dictionary and their variations used in attack
D. People dump their trash papers in garbage which may contain information to crack passwords
E. People write passwords in different places and disclose passwords naively to others
80. Malicious attempt by a single person or a group of people to cause the victim, site, or node to deny service to its customers.
A. Denial of Serive Attack
B. Password attack
C. Buffer overflow attack
D. Session Hijacking
E. All of the statements
81. One of the most famous documented DDoS attacks Apache2. How does the Apache2 work?
A. The client asks for a service by sending a request with many HTTP headers resulting Apache Web server to crash
B. Attack is launched against an apache Web server, which is flooded with requests containing a large number of front-slash ( / ) characters in the URL.
C. The attacker sends the victim a malformed GET request, which can crash the Web server.
D. The attacker sends the victim a TCP SYN packet that contains the same IP address as the source and destination addresses. Such a packet completely locks the victim's system.
E. The victim's mail queue is flooded by an abundance of messages, causing system failure.