Quizzes - Multiple Choice Questions PDF

Summary

This document is a collection of multiple-choice questions related to computer security and networking concepts. The questions cover topics like virus code analysis, network traffic capture, risk management, and security controls. It includes commands like tcpdump and nc, which are commonly used in networking.

Full Transcript

**quizzes** **Multiple-Choice Questions** 1. **What does this sample virus code (Unix script) do?** **bash** **Copy code** **\#!/bin/bash** **while:** **do** **echo -e \"a\"** **sleep 1** **done** - **a. Repeatedly restarts the computer.** - **b. Shuts down the computer after 1 seco...

**quizzes** **Multiple-Choice Questions** 1. **What does this sample virus code (Unix script) do?** **bash** **Copy code** **\#!/bin/bash** **while:** **do** **echo -e \"a\"** **sleep 1** **done** - **a. Repeatedly restarts the computer.** - **b. Shuts down the computer after 1 second.** - **c. Continuously creates a beep sound every second.** - **d. Deletes a file every second.** 2. **To capture all DNS (domain) traffic on the first Ethernet card, the correct command is:** - **a. sudo tcpdump -i localhost -A port 21** - **b. sudo tcpdump -i eth0 port 53** - **c. sudo tcpdump -i 127.0.0.1 -p 53** - **d. sudo tcpdump -i eth0 -A -port 21** 3. **A financial services company experiences a sudden and unexpected system outage due to a power failure in its primary data center. Although the system was offline for a short period, sensitive customer transactions could not be processed during this time. In the context of risk management, how should this event be categorized?** - **a. As a security event impacting the availability of services.** - **b. As a threat actor targeting customer financial data.** - **c. As a preventive control designed to test system resilience.** - **d. As a vulnerability due to the system\'s power dependency.** 4. **Which of the following is an example of a Detection Control in a risk management framework?** - **a. Sounding an alarm to alert security personnel of an intruder.** - **b. Implementing data backup solutions for system recovery.** - **c. Locking data center doors to prevent unauthorized access.** - **d. Training employees on security policies.** 5. **Which network security control is typically used to protect against IP address spoofing and TCP session hijacking?** - **a. IP Security (IPSec)** - **b. Kerberos** - **c. Transport Layer Security (TLS)** - **d. Secure Shell (SSH)** 6. **What does the \"Plan-Do-Check-Act\" (PDCA) model in ISO27001 signify?** - **a. A framework for categorizing security assets.** - **b. A risk assessment methodology for system hardware.** - **c. A model for implementing encryption standards.** - **d. A lifecycle approach to continual improvement in ISMS.** 7. **To allow netcat to listen on loopback interface on an FTP port, the correct command is:** - **a. nc -I 10.11.12.2 -p 21** - **b. nc -I 127.0.0.1 -p 22** - **c. nc -I 10.11.12.2 -p 23** - **d. nc -I 127.0.0.1 -p 21** 8. **To capture all telnet traffic to and from 10.11.12.3 and save it on a file, the command is:** - **a. tcpdump -i eth0 -s traffic.pcap host 10.11.12.3 and port 21** - **b. tcpdump -i eth0 -f traffic.pcap host 10.11.12.3 and port 23** - **c. tcpdump -i eth0 -o traffic.pcap host 10.11.12.3 and port 21** - **d. tcpdump -i eth0 -w traffic.pcap host 10.11.12.3 and port 23** 9. **What does this sample virus code (Unix script) do?** **bash** **Copy code** **\#!/bin/bash** **while :** **do** **touch \$RANDOM.txt** **done** - **a. Changes the system date to a random value.** - **b. Creates a new text file with a random name repeatedly.** - **c. Deletes all.txt files in the current directory.** - **d. Displays a random number on the screen.** 10. **In the context of cryptography, which of the following statements correctly describes the goals of security concerning illegitimate users?** - **a. Confidentiality ensures that illegitimate users are denied the ability to read information, while integrity ensures they cannot modify information, and authentication ensures they cannot impersonate legitimate users.** - **b. Confidentiality ensures that illegitimate users are denied modifying information, while integrity ensures they cannot impersonate legitimate users, and authentication ensures they cannot read information.** - **c. Authentication ensures that illegitimate users are denied the ability to modify information, while integrity ensures they cannot read information, and confidentiality ensures they cannot impersonate legitimate users.** - **d. Integrity ensures that illegitimate users are denied the ability to read information, while confidentiality ensures they cannot impersonate legitimate users, and authentication ensures they cannot modify information.** **Command-Based Tasks** 1. **You have downloaded an ISO image called newlinux.iso. It comes with a hash file to ensure that the image is not corrupted. Type the correct certutil command to generate an MD5 hash for the ISO image.\ Important: Ensure precise spelling and spacing; case is unimportant.** 2. **Perform an nmap scan in verbose mode on IP address 10.11.12.0/24 to find out which servers and devices are running.** - **Requirements: Use root privileges and type options in this order:** 1. **Option to find which hosts are running.** 2. **Verbose mode.** 3. **Target IP address.** **ANSW:** 3. **You want to scan the target host 208.67.201.5 to find out if it allows anonymous login. Type an exact Metasploit command to ensure that it is the correct host.** **ANSW:** 4. **Generate an executable file with a reverse TCP payload (windows/meterpreter/reverse\_tcp) using Metasploit.** - **Listening Host IP: 192.168.1.5** - **Port: 5321** - **File Name: counterstrike.exe in /home/mohamed\ Important: Ensure precise spelling and spacing.** **ANSW:** 5. **You need to scan the target host with the IP address 192.168.2.1 to determine the version of the SMTP server running on it. Enter the exact Metasploit command to use the auxiliary smtp\_version scanner.** **ANSW:**

Use Quizgecko on...
Browser
Browser