ISSC362 Week 5 Quiz

ISSC362 Week 5 Quiz

 

Question 1 of 20

 

5.0 Points

 

Which of the following tools allows database password cracking, ARP poisoning, enumeration, and sniffing?

 

A.Wireshark B.Nemesis C.Etherape D.Cain

 

Question 2 of 20

 

Which sniffer tool is designed to intercept and reveal passwords?

 

A.Windump B.Dsniff C.Wireshark D.All of the above

 

Question 3 of 20

 

Which of the following is a tool used for sniffing?

 

A.Hunt B.Tcpdump C.Nemesis D.SMAC

 

Question 4 of 20

 

Sniffing can be used to ___________.

 

A.troubleshoot connections B.investigate malware C.detect abnormal behavior D.All of the above

 

Question 5 of 20

 

5.0 Points

 

Which of the following attacks generally involves one computer targeting another, seeking to shut it down and deny legitimate use of its services?

 

A.Passive session hijacking B.Active session hijacking C.Denial of Service D.Covert channel

 

Question 6 of 20

 

5.0 Points

 

Which of the following attacks sends out bogus requests to any requesting device and the switch?

 

A.Spoofing B.Flooding C.Poisoning D.Hijacking

Question 7 of 20

 

Which of the following protocols is not easily sniffed?

 

A.SMTP B.HTTP C.SSH D.Telnet

 

Question 8 of 20

 

5.0 Points

 

Which of the following is an attack that actively injects packets into the network with the goal of disrupting and taking over an existing session on the network?

 

A.Sniffing B.Hijacking C.Denial of service D.Covert channel

 

Question 9 of 20

 

5.0 Points

 

Which of the following takes place on networks such as those that have a hub as the connectivity device?

 

A.Passive sniffing B.Promiscuous sniffing C.Active sniffing D.Switched sniffing

 

Question 10 of 20

 

5.0 Points

 

Which attack sends packets to a victim system with the same source and destination address and port, resulting in a system crash?

 

A.Fraggle B.Smurf C.Land D.Teardrop

 

Question 11 of 20

 

Who originally designed and created Linux?

 

A.Bill Gates B.Linus Torvalds

 

C.Steve Jobs D.Joseph Linux

 

Question 12 of 20

 

Which of the following is an application-level scanner?

 

A.Flawfinder B.SARA C.VLAD D.Nikto Simple

 

Question 13 of 20

 

5.0 Points

 

Which of the following is an early Linux firewall technology that controls traffic by checking packets?

 

A.ipchains B.iptables C.ipconfig D.ip host

 

Question 14 of 20

 

5.0 Points

 

In order to view the permissions assigned to each type of user for all the files located in a directory, which of the following Linux commands is issued?

A.dir/p B.ls -l C.cp -v D.rm -al

 

Question 15 of 20

 

5.0 Points

 

Which of the following Linux directories is considered to be similar to the Windows folder in the Microsoft operating system?

 

A./dev B./etc C./bin D./var

 

Question 16 of 20

 

5.0 Points

 

Which of the following Linux directories is the location of files that dictates access between hardware and the operating system?

 

A./dev B./etc C./bin D./var

 

Question 17 of 20

 

5.0 Points

 

Most versions of Linux make their source code available through which of the following methods?

 

A.General Public License (GPL)
B.Business Software Alliance (BSA) agreement C.K Desktop Environment (KDE)
D.UNIX

 

Question 18 of 20

 

The core component of every operating system is which of the following?

 

A.Kernel B.Shell
C.User interface D.BIOS

 

Question 19 of 20

 

In Linux, which of the following correctly denotes a hard drive in a machine?

 

A.mount_hda1 B.c:/drive1/ C./dev/hda1/ D./mnt/drive1/

 

Question 20 of 20

 

Approximately how many distributions of Linux are available in different forms and formats?

 

A.100 B.200 C.1,000 D.2,000

 

 
Do you need a similar assignment done for you from scratch? Order now!
Use Discount Code "Newclient" for a 15% Discount!