mcq | All About Testing https://allabouttesting.org Software Testing & Ethical Hacking Fundamentals Wed, 09 Nov 2022 16:18:57 +0000 en-US hourly 1 https://wordpress.org/?v=6.3.2 https://i0.wp.com/allabouttesting.org/wp-content/uploads/2018/02/cropped-logo-favicon.jpg?fit=32%2C32&ssl=1 mcq | All About Testing https://allabouttesting.org 32 32 135190090 Network Firewall https://allabouttesting.org/network-firewall/?utm_source=rss&utm_medium=rss&utm_campaign=network-firewall https://allabouttesting.org/network-firewall/#comments Mon, 30 Oct 2017 10:19:00 +0000 https://allabouttesting.org/?p=1266 Q1. Firewall is? a hardware a software can be hardware as well as software can neither be hardware nor a...

The post Network Firewall first appeared on All About Testing.

]]>
Q1. Firewall is?

  1. a hardware
  2. a software
  3. can be hardware as well as software
  4. can neither be hardware nor a software
Show Answer

Ans: 3.can be hardware as well as software

 

Q2. A proxy firewall filters at the?

  1. physical layer
  2. application layer
  3. data link layer
  4. network layer
Show Answer

Ans: 2.application layer

 

Q3. A packet filter firewall filters at the

  1. application or transport
  2. data link layer
  3. physical
  4. network or transport layer
Show Answer

Ans: 4.network or transport layer

 

Q4. Which firewall facility can monitor the state of active connections and use this information to determine which network packets to allow through the firewall.

  1. dynamic packet filter
  2. general protection fault
  3. partition
  4. Gateway
Show Answer

Ans: 1. dynamic packet filter

 

Q5.  Which private data network uses the public telecommunication infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures. 

  1.  Metcalfe’s Law
  2.  VPN
  3.  DMZ
  4.  personal firewall
Show Answer

Ans: 2.VPN

 

Q6. DHCP is the abbreviation of

  1. Dynamic Host Control Protocol
  2. Dynamic Host Configuration Protocol
  3. Dynamic Hyper Control Protocol
  4. Dynamic Hyper Configuration Protocol
Show Answer

Ans: 2. Dynamic Host Configuration Protocol

 

Q7. Which server acts as an intermediary between a workstation user and the Internet so that the enterprise can ensure security, administrative control, and caching service.

  1. Kerberos
  2.  security policy
  3.  proxy server
  4.  Metcalfe’s Law
Show Answer

Ans: 3. proxy server

 

Q8. Which software application is used to protect a single Internet-connected computer from intruders.

  1. personal firewall
  2. Bastion host
  3. sniffer
  4. Web Proxy Autodiscovery
Show Answer

Ans: 1. personal firewall

 

Q9. Which is the only host computer that a company allows to be addressed directly from the public network — it is designed to screen the rest of its network from security exposure.

  1. personal firewall
  2. bastion host
  3.  sniffer
  4. D. Web Proxy Autodiscovery
Show Answer

Ans: 2.bastion host

 

Q10. Which set of rules governs what is and what is not allowed through the firewall? 

  1.  Web Proxy Autodiscovery
  2.  rule base
  3. dynamic packet filter
  4.  general protection fault 
Show Answer

Ans: 3.dynamic packet filter

 

The post Network Firewall first appeared on All About Testing.

]]>
https://allabouttesting.org/network-firewall/feed/ 1 1266
Cyber Security https://allabouttesting.org/cyber-security/?utm_source=rss&utm_medium=rss&utm_campaign=cyber-security https://allabouttesting.org/cyber-security/#respond Mon, 30 Oct 2017 10:16:51 +0000 https://allabouttesting.org/?p=1263 Q1. What is the preferred communications method used with systems on a bot­net? IRC E­mail ICMP TFTP   Q2. What...

The post Cyber Security first appeared on All About Testing.

]]>
Q1. What is the preferred communications method used with systems on a bot­net?

  1. IRC
  2. E­mail
  3. ICMP
  4. TFTP

Show Answer

Ans: 1.IRC

 

Q2. What will an open port return from an ACK scan?

  1. RST
  2. SYN/ACK
  3. FIN
  4. Nothing

Show Answer

Ans: 1.RST

 

Q3. Your target system is behind a firewall. Using hping2, you craft SYN packets to send with a hop count capable of reaching the host. You then send these packets out with port numbers from 1 to 1024. What action are you performing?

  1. Firewalling
  2. Firewalking
  3. Passive footprinting
  4. XMAS scan

Show Answer

Ans: 2.Firewalking

 

Q4. Which of the following is true regarding WEP cracking?

  1. Initialization vectors are small, get reused frequently, and are sent in cleartext.
  2. Initialization vectors are small, get reused frequently, but are encrypted during transmission.
  3. Initialization vectors are large, get reused frequently, and are sent in cleartext.
  4. Initialization vectors are large, get reused frequently, but are encrypted during transmission.

Show Answer

Ans: 1.Initialization vectors are small, get reused frequently, and are sent in cleartext.

 

Q5. Which of the following best describes a distributed denial­of­service attack?

  1. A DoS against an entire subnet, affecting multiple systems
  2. A DoS against multiple systems across an enterprise network
  3. A DoS against similar systems in different target networks
  4. A DoS carried out by multiple systems

Show Answer

Ans: 4.A DoS carried out by multiple systems

 

Q6. Which of the following is a passive wireless discovery tool?

  1. NetStumbler
  2. Aircrack
  3. Kismet
  4. Netsniff

Show Answer

Ans: 3.Kismet

 

Q7. What does the program EliteWrap do?

  1. Provides secure, encrypted tunneling between hosts
  2. Provides proxy services to obfuscate source IPs
  3. Ports code easily between different operating systems
  4. Binds Trojans to legitimate files for exploitation later

Show Answer

Ans: 4.Binds Trojans to legitimate files for exploitation later

 

Q8. Scanning is performed in which phase of a pen test?

  1. Pre­attack
  2. Attack
  3. Post­attack
  4. Reconnaissance

Show Answer

Ans: 1.Preattack

 

Q9. What is TKIP and how does it make WPA­2 a better security choice for your wireless network?

  1. Temporal Key Integrity Protocol. It forces a key change every 10,000 packets or so.
  2. Temporal Key Integrity Protocol. It forces a key change every time a bit is sent.
  3. Temporary Key Integration Protocol. It forces a key change every 10,000 packets or so.
  4. Temporary Key Integration Protocol. It forces a key change every time a bit is sent.

Show Answer

Ans: 1.Temporal Key Integrity Protocol. It forces a key change every 10,000 packets or so.

 

Q10. What is the attack called “evil twin”?

  1. MAC spoofing
  2. ARP poisoning
  3. Rogue access point
  4. Session hijacking

Show Answer

Ans: 3.Rogue access point

 

The post Cyber Security first appeared on All About Testing.

]]>
https://allabouttesting.org/cyber-security/feed/ 0 1263
Cryptography https://allabouttesting.org/cryptography/?utm_source=rss&utm_medium=rss&utm_campaign=cryptography https://allabouttesting.org/cryptography/#comments Mon, 30 Oct 2017 10:15:27 +0000 https://allabouttesting.org/?p=1261 Q1. This is an encryption/decryption key known only to the party or parties that exchange secret messages.  e-signature  digital certificate...

The post Cryptography first appeared on All About Testing.

]]>
Q1. This is an encryption/decryption key known only to the party or parties that exchange secret messages.

  1.  e-signature
  2.  digital certificate
  3.  private key
  4.  security token

Show Answer

Answer: 3. private key

 

Q2. Cryptographic hash function takes an arbitrary block of data and returns

  1.  fixed size bit string
  2.  variable size bit string
  3.  both (1) and (2)
  4.  none of the mentioned

Show Answer

Answer: 1. fixed size bit string

 

Q3. The inverse of 37 mod 49 is

  1.  23
  2.  12
  3.  4
  4.  6

Show Answer

Answer: 3.  4

Explanation: 37-1 mod 49 = 4
Step 1. Calculate A * B mod C for B values 0 through C-1
Step 2. The modular inverse of A mod C is the B value that makes A * B mod C = 1

 

Q4. This is a mode of operation for a block cipher, with the characteristic that each possible block of plaintext has a defined corresponding ciphertext value and vice versa.

  1. footprinting
  2. hash function
  3. watermark
  4. Electronic Code Book

Show Answer

Answer: 4. Electronic Code Book

 

Q5. How many primitive roots are there for 19?

  1.  4
  2.  5
  3.  3
  4.  6

Show Answer

Answer: 4.  6

Explanation: 2, 3, 10, 13, 14, 15 are the primitive roots of 19.
Let p be a prime. Then b is a primitive root for p if the powers of b,
1, b, b^2, b^3, …
include all of the residue classes mod p (except 0).

 

Q6. Voice privacy in GSM cellular telephone protocol is provided by

  1.  A5/2 cipher
  2.  b5/4 cipher
  3.  b5/6 cipher
  4.  b5/8 cipher

Show Answer

Answer: 1. A5/2 cipher

 

Q7. In cryptography, the order of the letters in a message is rearranged by

  1. transpositional ciphers
  2. substitution ciphers
  3. both (1) and (2)
  4. none of the mentioned

Show Answer

Answer: 1. transpositional ciphers

 

Q8. What is data encryption standard (DES)?

  1. block cipher
  2. stream cipher
  3. bit cipher
  4. none of the mentioned

Show Answer

Answer: 1. block cipher

 

Q9. The cryptography algorithms used in S/MIME are _________.

  1. IDEA.
  2. RC4.
  3. RSA,DES-3.
  4. RC5.

Show Answer

Answer: 3.RSA,DES-3

 

Q10. In asymmetric key cryptography, the private key is kept by

  1. sender
  2. receiver
  3. sender and receiver
  4. all the connected devices to the network

Show Answer

Answer: 2. receiver

 

The post Cryptography first appeared on All About Testing.

]]>
https://allabouttesting.org/cryptography/feed/ 3 1261