Question #:1
What type of OS fingerprinting technique sends specially crafted packets to the remote OS and analyzes the
received response?
A. Passive
B.Reflective
C. Active
D. Distributive
Answer: C
Question #:2
Which command line switch would be used in NMAP to perform operating system detection?
A. -OS
B. -sO
C. -sP
D. -O
Answer: D
Question #:3
International Organization for Standardization (ISO) standard 27002 provides guidance for compliance by
outlining
A. guidelines and practices for security controls.
B. financial soundness and business viability metrics.
C. standard best practice for configuration management.
D. contract agreement writing standards.
Answer: A
Question #:4
Which of the following is an example of IP spoofing?
A. SQL injections
B. Man-in-the-middle
C. Cross-site scripting
D. ARP poisoning
Answer: B
Question #:5
Which of the following is assured by the use of a hash?
A. Integrity
B. Confidentiality
C. Authentication
D. Availability
Answer: A
Explanation
An important application of secure hashes is verification of message integrity. Determining whether any
changes have been made to a message (or a file), for example, can be accomplished by comparing message
digests calculated before, and after, transmission (or any other event).
References:
https://en.wikipedia.org/wiki/Cryptographic_hash_function#Verifying_the_integrity_of_files_or_messages
No comments:
Post a Comment