1.
The following is part of a log file taken from the machine on the network with the IP address of 192.168.0.110: What type of activity has been logged?
2.
You are attempting to run an Nmap port scan on a web server. Which of the following commands would result in a scan of common ports with the least amount of noise in order to evade IDS?
3.
Bob, your senior colleague, has sent you a mail regarding aa deal with one of the clients. You are requested to accept the offer and you oblige. After 2 days, Bob denies that he had ever sent a mail. What do you want to "know" to prove yourself that it was Bob who had send a mail?
4.
What is attempting an injection attack on a web server based on responses to True/False questions called?
5.
The establishment of a TCP connection involves a negotiation called three-way handshake. What type of message does the client send to the server in order to begin this negotiation?
6.
You need a tool that can do network intrusion prevention and intrusion detection, function as a network sniffer, and record network activity. What tool would you most likely select?
7.
Which of the following will perform an Xmas scan using NMAP?
8.
Code injection is a form of attack in which a malicious user:
9.
The collection of potentially actionable, overt, and publicly available information is known as
10.
Which one of the following Google advanced search operators allows an attacker to restrict the results to those websites in the given domain?