Exam 6: Techniques Used by Hackers
Exam 1: Introduction to Computer Security24 Questions
Exam 2: Networks and the Internet25 Questions
Exam 3: Cyber Stalking, Fraud, and Abuse25 Questions
Exam 4: Denial of Service Attacks25 Questions
Exam 5: Malware25 Questions
Exam 6: Techniques Used by Hackers25 Questions
Exam 7: Industrial Espionage in Cyberspace25 Questions
Exam 8: Encryption25 Questions
Exam 9: Computer Security Software23 Questions
Exam 10: Security Policies25 Questions
Exam 11: Network Scanning and Vulnerability Scanning21 Questions
Exam 12: Cyber Terrorism and Information Warfare23 Questions
Exam 13: Cyber Detective24 Questions
Exam 14: Introduction to Forensics25 Questions
Select questions type
ACK scans and NULL scans work only on UNIX systems.
Free
(True/False)
4.8/5
(31)
Correct Answer:
True
Scanning bulletin boards,making phony phone calls,and visiting websites by a hacker are examples of _________.
Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
B
_________ is a popular tool for cracking Windows passwords.
Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
D
When an attacker injects client-side scripts into web pages viewed by other users so that those users interact with it,it is an example of _________.
(Multiple Choice)
5.0/5
(30)
With a(n)_________ scan,if the port is closed,the response is an RST.If the port is open,the response is a SYN/ACK.
(Multiple Choice)
4.8/5
(38)
Checking an organization's websites is a form of active scanning.
(True/False)
4.7/5
(29)
Testing an organization's security is known as ________ testing.
(Multiple Choice)
4.8/5
(34)
The most popular port scanner in the hacking and security community is ________.
(Multiple Choice)
4.8/5
(33)
___________ is the process to find out what is on a target system.
(Multiple Choice)
4.9/5
(39)
There are 1,024 well-known ________ that are usually associated with specific services.
(Multiple Choice)
4.8/5
(31)
The net command can be included in a ________ that will create a domain admin account.
(Multiple Choice)
4.8/5
(36)
Passing structured query language commands to a web application and getting the website to execute it is called SQL script _________.
(Multiple Choice)
4.9/5
(35)
Sid2User,UserInfo,and UserDump are examples of password cracking tools.
(True/False)
4.9/5
(37)
Showing 1 - 20 of 25
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)