Update) Network and Security Foundation
Pre-Assessment Questions with Verified
Answers | 100% Correct | Grade A.
Question:
An attacker attempts to misdirect traffic on a network back to the attacker
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
by corrupting the network computer's cache of IP address to MAC
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
address mappings that are cached. Which exploit is the attacker
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
perpetrating?
a. Port scanning
i,- i,-
b. Wiretapping
i,-
c. Denial-of-service
i,-
d. ARP poisoning?
i,- i,-
Answer:
ARP poisoning i,-
Question:
Which exploit actually breaches the physical medium or uses devices to
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
monitor signals from outside the physical medium itself?
i,- i,- i,- i,- i,- i,- i,-
,a. Spoofing
i,-
b. Wiretapping
i,-
c. Sniffing
i,-
d. Port scanning?
i,- i,-
Answer:
Wiretapping
Question:
Which type of attack can overwhelm a web server by inserting more data
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
into a web form than the system was configured to hold?
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
a. Buffer overflow
i,- i,-
b. ARP poisoning
i,- i,-
c. Session hijacking
i,- i,-
d. Cross-site scripting?
i,- i,-
Answer:
Buffer overflow
i,-
Question:
,Which type of attack sends an email claiming to be from a reputable
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
business in order to entice the recipient to provide sensitive information?
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
a. Denial-of-service
i,-
b. Phishing
i,-
c. Password attacks
i,- i,-
d. Man-in-the-middle?
i,-
Answer:
Phishing
Question:
A user on a network is planning to launch an exploit against a coworker in
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
a neighboring department. The user needs to identify the IP address of a
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
coworker in the desired department. Which tool or utility will allow the
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
user to watch network traffic in real time to identify a target?
i,- i,- i,- i,- i,- i,- i,- i,- i,- i,- i,-
a. Port scan
i,- i,-
b. Antivirus software
i,- i,-
c. Sniffer
i,-
d. Port redirection?
i,- i,-
Answer:
Sniffer
, Question:
Which group of attackers is typically used for penetration testing?
i,- i,- i,- i,- i,- i,- i,- i,- i,-
a. Red Team
i,- i,-
b. Blue Team
i,- i,-
c. White Team
i,- i,-
d. Gray Team?
i,- i,-
Answer:
Red Teami,-
Question:
Which type of attack exploits an unpatched software vulnerability?
i,- i,- i,- i,- i,- i,- i,- i,-
a. Zero-day
i,-
b. Brue-force
i,-
c. Diffie-Hellman
i,-
d. Man-in-the-middle?
i,-
Answer:
Zero-day