ISSC362 Week 5 Quiz
Question 1 of 20
5.0 Points
Which of the following tools allows database password cracking, ARP poisoning, enumeration, and sniffing?
A.Wireshark B.Nemesis C.Etherape D.Cain
Question 2 of 20
Which sniffer tool is designed to intercept and reveal passwords?
A.Windump B.Dsniff C.Wireshark D.All of the above
Question 3 of 20
Which of the following is a tool used for sniffing?
A.Hunt B.Tcpdump C.Nemesis D.SMAC
Question 4 of 20
Sniffing can be used to ___________.
A.troubleshoot connections B.investigate malware C.detect abnormal behavior D.All of the above
Question 5 of 20
5.0 Points
Which of the following attacks generally involves one computer targeting another, seeking to shut it down and deny legitimate use of its services?
A.Passive session hijacking B.Active session hijacking C.Denial of Service D.Covert channel
Question 6 of 20
5.0 Points
Which of the following attacks sends out bogus requests to any requesting device and the switch?
A.Spoofing B.Flooding C.Poisoning D.Hijacking
Question 7 of 20
Which of the following protocols is not easily sniffed?
A.SMTP B.HTTP C.SSH D.Telnet
Question 8 of 20
5.0 Points
Which of the following is an attack that actively injects packets into the network with the goal of disrupting and taking over an existing session on the network?
A.Sniffing B.Hijacking C.Denial of service D.Covert channel
Question 9 of 20
5.0 Points
Which of the following takes place on networks such as those that have a hub as the connectivity device?
A.Passive sniffing B.Promiscuous sniffing C.Active sniffing D.Switched sniffing
Question 10 of 20
5.0 Points
Which attack sends packets to a victim system with the same source and destination address and port, resulting in a system crash?
A.Fraggle B.Smurf C.Land D.Teardrop
Question 11 of 20
Who originally designed and created Linux?
A.Bill Gates B.Linus Torvalds
C.Steve Jobs D.Joseph Linux
Question 12 of 20
Which of the following is an application-level scanner?
A.Flawfinder B.SARA C.VLAD D.Nikto Simple
Question 13 of 20
5.0 Points
Which of the following is an early Linux firewall technology that controls traffic by checking packets?
A.ipchains B.iptables C.ipconfig D.ip host
Question 14 of 20
5.0 Points
In order to view the permissions assigned to each type of user for all the files located in a directory, which of the following Linux commands is issued?
A.dir/p B.ls -l C.cp -v D.rm -al
Question 15 of 20
5.0 Points
Which of the following Linux directories is considered to be similar to the Windows folder in the Microsoft operating system?
A./dev B./etc C./bin D./var
Question 16 of 20
5.0 Points
Which of the following Linux directories is the location of files that dictates access between hardware and the operating system?
A./dev B./etc C./bin D./var
Question 17 of 20
5.0 Points
Most versions of Linux make their source code available through which of the following methods?
A.General Public License (GPL)
B.Business Software Alliance (BSA) agreement C.K Desktop Environment (KDE)
D.UNIX
Question 18 of 20
The core component of every operating system is which of the following?
A.Kernel B.Shell
C.User interface D.BIOS
Question 19 of 20
In Linux, which of the following correctly denotes a hard drive in a machine?
A.mount_hda1 B.c:/drive1/ C./dev/hda1/ D./mnt/drive1/
Question 20 of 20
Approximately how many distributions of Linux are available in different forms and formats?
A.100 B.200 C.1,000 D.2,000