Ethical Hacking(Engineering > Computer Science And Engineering ) Questions and Answers

Question 1. What is the preferred communications method used with systems on a bot-net?
  1.    IRC
  2.    E-mail
  3.    ICMP
  4.    TFTP
Explanation:-
Answer: Option A. -> IRC





Question 2. What are the forms of password cracking techniques?
  1.    AttackBrute Forcing
  2.    AttacksHybrid
  3.    AttackSyllable
  4.    All of the above
Explanation:-
Answer: Option D. -> All of the above





Question 3. What is the attack called "evil twin?
  1.    MAC spoofing
  2.    ARP poisoning
  3.    Rogue access point
  4.    Session hijacking
Explanation:-
Answer: Option C. -> Rogue access point





Question 4. Which wireless standard can operate at speeds of 100+ Mbps and uses the 2.4GHz to 5GHz range?
  1.    802.11a
  2.    802.11b
  3.    802.11g
  4.    802.11n
Explanation:-
Answer: Option D. -> 802.11n





Question 5. At which layer of the OSI communication model dose bridge operate?
  1.    Transport
  2.    Datalink
  3.    Network
  4.    Physical
Explanation:-
Answer: Option B. -> Datalink





Question 6. Which wireless mode connects machines directly to one another, without the use of an access point?
  1.    Point to point
  2.    Infrastructure
  3.    Ad hoc
  4.    BSS
Explanation:-
Answer: Option C. -> Ad hoc





Question 7. Which of the following is true regarding WEP cracking?
  1.    Initialization vectors are small, get reused frequently, and are sent in cleartext
  2.    Initialization vectors are small, get reused frequently, but are encrypted during transmission
  3.    Initialization vectors are large, get reused frequently, and are sent in cleartext
  4.    Initialization vectors are large, get reused frequently, but are encrypted during transmission
Explanation:-
Answer: Option A. -> Initialization vectors are small, get reused frequently, and are sent in cleartext





Question 8. CDMA stands for
  1.    Code data multiple access
  2.    Code division multiple access
  3.    None of the above
  4.    Code data management authority
Explanation:-
Answer: Option B. -> Code division multiple access





Question 9. What is the maximum length of an SSID?
  1.    Eight characters
  2.    Sixteen characters
  3.    Thirty-two characters
  4.    Sixty-four characters
Explanation:-
Answer: Option C. -> Thirty-two characters





Question 10. Which of the following is a passive wireless discovery tool?
  1.    NetStumbler
  2.    Aircrack
  3.    Kismet
  4.    Netsniff
Explanation:-
Answer: Option C. -> Kismet