Ethical Hacking - Assignment 1 ()
What type of cryptography is demonstrated by reversing the alphabet so
A becomes Z, B becomes Y, and so on? - <<<ANSWER>>>substitution
cipher
Closed ports respond to a NULL scan with what type of packet? -
<<<ANSWER>>>RST
What port does the Domain Name System, or DNS service use? -
<<<ANSWER>>>53
Early Windows OSs used which of the following programs loaded into
memory to interact with a network resource or device? -
<<<ANSWER>>>NetBIOS
In the TCP/IP stack, the Transport layer includes network services and
client software - <<<ANSWER>>>False
In the Perl programming language, comment lines begin with the which
of the following character(s)? - <<<ANSWER>>>#
What type of viruses and code has been created by security researchers
and attackers that could infect phones running Google's Android,
Windows Mobile, and the Apple iPhone OS? - <<<ANSWER>>>Java-
based
What type of cryptography is demonstrated by reversing the alphabet so
A becomes Z, B becomes Y, and so on? - <<<ANSWER>>>substitution
cipher
Closed ports respond to a NULL scan with what type of packet? -
<<<ANSWER>>>RST
What port does the Domain Name System, or DNS service use? -
<<<ANSWER>>>53
Early Windows OSs used which of the following programs loaded into
memory to interact with a network resource or device? -
<<<ANSWER>>>NetBIOS
In the TCP/IP stack, the Transport layer includes network services and
client software - <<<ANSWER>>>False
In the Perl programming language, comment lines begin with the which
of the following character(s)? - <<<ANSWER>>>#
What type of viruses and code has been created by security researchers
and attackers that could infect phones running Google's Android,
Windows Mobile, and the Apple iPhone OS? - <<<ANSWER>>>Java-
based