Untitled Quiz
64 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which command is used to print all process information in Linux?

  • ls -d
  • su
  • ps -ef (correct)
  • ls -l
  • What does the number '4' signify in the command 'chmod 741'?

  • Read-only permission
  • Write permission
  • Execute permission (correct)
  • All permissions
  • Which command is used to view the last 100 lines of a file log in Linux?

  • grep -100 log
  • tail -100 log (correct)
  • cat -100 log
  • mv -100 log
  • In Oracle, which user has the highest default privileges?

    <p>sys</p> Signup and view all the answers

    What does HTTP status code 403 indicate?

    <p>Access to the requested resource is forbidden</p> Signup and view all the answers

    Which SQL command is used to add a column to an existing table?

    <p>update</p> Signup and view all the answers

    Which header allows a response to redirect to a new location?

    <p>Location</p> Signup and view all the answers

    How can a file be uploaded to a server with no internet access due to a command execution vulnerability?

    <p>FTP</p> Signup and view all the answers

    What attack method involves inputting an excessively long string into a limited space?

    <p>Buffer Overflow</p> Signup and view all the answers

    Which command shows the Linux kernel version?

    <p>uname -a</p> Signup and view all the answers

    What is the approximate time required to brute force a 56-bit key using an exhaustive method at a speed of $10^6$ attempts per second?

    <p>5.4x10^24 years</p> Signup and view all the answers

    Which group was established in February 2014, with Xi Jinping as its leader?

    <p>Central Network Security and Informatization Leading Group</p> Signup and view all the answers

    What date did the Cybersecurity Law come into effect?

    <p>June 1, 2017</p> Signup and view all the answers

    What kind of attack can be performed using XXE vulnerabilities?

    <p>Read server files</p> Signup and view all the answers

    Which of the following is considered an active defense technology?

    <p>Honeypot Technology</p> Signup and view all the answers

    Which status code is returned when a user does not have permission to access a given page?

    <p>403</p> Signup and view all the answers

    In a Linux system, where are the operational logs stored?

    <p>/var/log</p> Signup and view all the answers

    Which tool is typically used for SQL injection attacks?

    <p>sqlmap</p> Signup and view all the answers

    What information can be directly obtained by conducting a port scan on a target host?

    <p>Services running on open ports of the target host</p> Signup and view all the answers

    What cannot effectively defend against XSS attacks?

    <p>Data encryption</p> Signup and view all the answers

    Which of the following statements about phishing is incorrect?

    <p>Phishing is unrelated to web services</p> Signup and view all the answers

    Which of the following statements about server-side request forgery (SSRF) vulnerabilities is correct?

    <p>SSRF vulnerabilities are server-based attacks</p> Signup and view all the answers

    What is the primary purpose of APT attacks?

    <p>Persistent intrusion for strategic control</p> Signup and view all the answers

    Which command can be used to retrieve DNS records?

    <p>dig</p> Signup and view all the answers

    Which command in SQL is used to completely remove a table?

    <p>drop</p> Signup and view all the answers

    Which of the following configurations is NOT included in Apache's default parsed suffixes?

    <p>.pht</p> Signup and view all the answers

    Which is not a characteristic of APT attacks?

    <p>Rare occurrence</p> Signup and view all the answers

    In a network, what happens if a switch receives a packet with a destination MAC address not in its MAC address table?

    <p>The packet is broadcasted to all interfaces</p> Signup and view all the answers

    What is the default port for Redis databases?

    <p>6379</p> Signup and view all the answers

    Which command would NOT reveal the hostname of a Windows system?

    <p>set</p> Signup and view all the answers

    Which version of MySQL is necessary to use the base64() function?

    <p>5.5 version</p> Signup and view all the answers

    Which type of algorithm is RSA classified as?

    <p>Asymmetric algorithm</p> Signup and view all the answers

    What does data integrity ensure?

    <p>Users receive exactly what was sent</p> Signup and view all the answers

    Which command is used to view the /var/log/wtmp log?

    <p>last</p> Signup and view all the answers

    What is the incorrect statement regarding SUID permissions?

    <p>SUID permissions are universally applicable to all files</p> Signup and view all the answers

    Which policy can potentially impact normal production business if enabled?

    <p>Limit security audit recording</p> Signup and view all the answers

    Which of these tools is commonly used for web vulnerability scanning?

    <p>IBM APPSCAN</p> Signup and view all the answers

    What is the purpose of setting IP-MAC binding?

    <p>Prevent unauthorized access</p> Signup and view all the answers

    Which command enables a user to view currently logged-in users on a Windows server?

    <p>query user</p> Signup and view all the answers

    What data structure is formed when high-level protocols pass data to the network layer?

    <p>Data packet</p> Signup and view all the answers

    Which method can be used to prevent replay attacks effectively?

    <p>Implement one-time encryption methods</p> Signup and view all the answers

    What action cannot be performed by a CSRF attack?

    <p>Steal user credentials</p> Signup and view all the answers

    Which of the following describes the characteristics of an SQL killer worm virus?

    <p>Consumes large amounts of network bandwidth</p> Signup and view all the answers

    The strongest credential authentication method among the following is?

    <p>MS-CHAP</p> Signup and view all the answers

    Which attack is characterized by impersonating someone by using their information in messages?

    <p>Social engineering attack</p> Signup and view all the answers

    What is NOT included in the purpose of digital signatures?

    <p>Receiver identity confirmation</p> Signup and view all the answers

    What is the essence of ARP spoofing?

    <p>Provide a virtual combination of MAC and IP addresses</p> Signup and view all the answers

    What is not a typical security monitoring mechanism for upload functionalities?

    <p>Client-side JavaScript validation</p> Signup and view all the answers

    Which technology can provide real-time protection against internal, external attacks, and misoperations?

    <p>Intrusion detection</p> Signup and view all the answers

    Which network attack is characterized by the TCP three-way handshake process?

    <p>SYN Flood attack</p> Signup and view all the answers

    Which SQL command requires the least permissions for reading operating system files?

    <p>LoadFile</p> Signup and view all the answers

    Which statement about CC attacks is incorrect?

    <p>CC attacks can easily gain control of target machines</p> Signup and view all the answers

    Which OSI security architecture layer provides data integrity services?

    <p>Data Link Layer</p> Signup and view all the answers

    What describes the trend in network attack methods?

    <p>Increasing sophistication of attack tools</p> Signup and view all the answers

    What command can be used with nmap to skip host discovery for the known active host 192.168.20.20?

    <p>nmap -Pn 192.168.20.20</p> Signup and view all the answers

    Which PHP function is used to prevent SQL injection?

    <p>mysql_real_escape_string</p> Signup and view all the answers

    Which command is used in sqlmap to retrieve all database names?

    <p>dbs</p> Signup and view all the answers

    What is incorrect about the description of IIS short file name vulnerabilities?

    <p>Short-named files do not have corresponding short file names.</p> Signup and view all the answers

    Which command can be used to check Linux password expiration?

    <p>passwd</p> Signup and view all the answers

    What command is used for a SYN scan with nmap?

    <p>-sS</p> Signup and view all the answers

    Which method allows IP address to domain name resolution?

    <p>Reverse</p> Signup and view all the answers

    What incorrect pairing of Linux file permissions is displayed?

    <p>rwx-r--r-- 622</p> Signup and view all the answers

    In HTTP status codes, which one indicates redirection?

    <p>302</p> Signup and view all the answers

    Which of the following tools is commonly used for web vulnerability scanning?

    <p>Acunetix WVS (AWVS)</p> Signup and view all the answers

    Study Notes

    Question Selection

    • Questions cover various security topics, including vulnerabilities, network protocols, and web applications.
    • Questions are multiple choice format, testing knowledge of specific commands, attack types, and system configurations.
    • Question sets include different levels of difficulty, assessing different areas of security expertise.
    • Topics include: XXE (XML External Entity Injection), WebLogic vulnerabilities, Apache configuration, SQL injection, SSRF (Server-Side Request Forgery), security protocols, and more.
    • Question sets evaluate knowledge base of security concepts and their practical application.

    Question Details

    • Question 1: Vulnerability types, focusing on various attack vectors and their consequences.
    • Question 2: Network security, identifying correct commands for network analysis and potential attacks.
    • Question 3: Web application security, determining appropriate actions to protect against vulnerabilities.
    • Question 4: Understanding of specific tools and their intended use in security testing.
    • Question 5: Various security topics, covering general security concepts and best practices to avoid breaches.
    • Question 6: Multiple-choice questions testing the knowledge of different aspects of security.

    Database Security

    • Question 10: SQLSERVER database authentication modes, specifically focusing on which modes are incorrect.
    • Question 11: Exploiting vulnerabilities in SQLSERVER database authentication.
    • Question 12: Understanding SQL Server authentication mechanisms.
    • Question 13: Discussing common issues with web script programming.

    Network security vulnerabilities

    • Question 13: Exploiting various network vulnerabilities, focusing on specific types of attacks and their effects.
    • Question 14: Identifying specific attacks based on malicious activities and the characteristics of those activities.
    • Question 15-16: General overview and characteristics of server-side attacks and their effects on web applications.

    General Network Attacks

    • Question 18: Different attack vectors and their characteristics.
    • Question 19: Different aspects of attack methods to exploit system vulnerabilities.

    WEB Application Security

    • Question 20: Identifying security threats by examining web application behavior.
    • Question 24: Examines specific vulnerabilities in different attack types.
    • Question 25: Exploring techniques and strategies used to mitigate vulnerabilities.
    • Question 26: Reviewing types of attacks and methods/protocols used.

    General Security Concepts

    • Question 27: Reviewing types of attacks (e.g., SQL injection).
    • Question 28-29: Covering different attacks and vulnerabilities.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    More Like This

    Untitled Quiz
    37 questions

    Untitled Quiz

    WellReceivedSquirrel7948 avatar
    WellReceivedSquirrel7948
    Untitled Quiz
    55 questions

    Untitled Quiz

    StatuesquePrimrose avatar
    StatuesquePrimrose
    Untitled Quiz
    18 questions

    Untitled Quiz

    RighteousIguana avatar
    RighteousIguana
    Untitled Quiz
    48 questions

    Untitled Quiz

    StraightforwardStatueOfLiberty avatar
    StraightforwardStatueOfLiberty
    Use Quizgecko on...
    Browser
    Browser