Pages

Wednesday, 23 September 2015

Ethical Hacking Objective type Questions and Answers

6. What does the program EliteWrap do?
 A. Provides secure, encrypted tunneling between hosts
 B. Provides proxy services to obfuscate source IPs
 C. Ports code easily between different operating systems
 D. Binds Trojans to legitimate files for exploitation later
Ans: D

7. What is the attack called “evil twin”?
 A. MAC spoofing
 B. ARP poisoning
 C. Rogue access point
 D. Session hijacking
Ans: C

8. Which of the following is a passive wireless discovery tool?
 A. NetStumbler
 B. Aircrack
 C. Kismet
 D. Netsniff
Ans: C

9. What is TKIP and how does it make WPA-2 a better security choice for your wireless network?
 A. Temporal Key Integrity Protocol. It forces a key change every 10,000 packets or so.
 B. Temporal Key Integrity Protocol. It forces a key change every time a bit is sent.
 C. Temporary Key Integration Protocol. It forces a key change every 10,000 packets or so.
 D. Temporary Key Integration Protocol. It forces a key change every time a bit is sent.
Ans: A

10. Which of the following is true regarding WEP cracking?
 A. Initialization vectors are small, get reused frequently, and are sent in cleartext.
 B. Initialization vectors are small, get reused frequently, but are encrypted during transmission.
 C. Initialization vectors are large, get reused frequently, and are sent in cleartext.
 D. Initialization vectors are large, get reused frequently, but are encrypted during transmission.
Ans: A

More Questions & Answers:-
Page1 Page2 Page3

No comments:

Post a Comment