Que.How many primary ways are there for detecting buffer-overflow?
|
a. 6 |
b. 3 |
c. 2 |
d. 5 |
Que.Testing for buffer-overflow in a system can be done manually and has two possible ways.
|
a. True |
b. False |
c. May be True or False |
d. Can’t say |
Que.Attackers commonly target ____________ for fetching IP address of a target or victim user.
|
a. websites |
b. web pages |
c. ip tracker |
d. emails |
Que.Developing a fake or less useful website and is meant to just fetch the IP address is very easily done by attackers.
|
a. True |
b. False |
c. May be True or False |
d. Can’t say |
Que.What common web scripting languages are used by attackers to fetch various details from its surfing users?
|
a. Tcl and C# |
b. C++ and HTML |
c. HTML and Python |
d. Perl and JavaScript |
Que.______________ is the first phase of ethical hacking.
|
a. DNS poisoning |
b. Footprinting |
c. ARP-poisoning |
d. Enumeration |
Que.Enumeration is done to gain information. Which of the following cannot be achieved using enumeration?
|
a. IP Tables |
b. SNMP data, if not secured appropriately |
c. Private chats |
d. List of username and password policies |
Que.Enumeration does not depend on which of the following services?
|
a. DNS enumeration |
b. SNMP enumeration |
c. NTP enumeration |
d. HTTPS enumeration |
Que.__________ suite is used for NTP enumeration.
|
a. DNS |
b. NTP |
c. HTTP |
d. SNMP |
Que.enum4linux is used to enumerate _______________
|
a. Linux systems |
b. Windows systems |
c. Chrome systems |
d. Mac systems |