Daily Multiple Choice Test

What command is used to understand what a metasploit module will do during execution
info
show options
check
run
info
When using the inbuilt ping command to identify live hosts what is most useful
writing a loop to ping a target range
using hyper-threading to speed up the scan
having verbose output
outputing results into a file
writing a loop to ping a target range
What does WPA stand for
Wi-Fi Protected Access
Wired Privacy Access
World Protocol Access
Weaponised Payload Attack
Wi-Fi Protected Access
when running ping 8.8.8.8, how many ping request will a linux machine send
an unlimited number
4
100
1
an unlimited number
Which Windows command is roughly the equivalent to the Linux command netstat -anp
netstat -anb
netstat -anp
netstat -an
netstat -a
netstat -anb
Which program is used by Linux to schedule a program or script to run at particular times
cron
vi
outlook
scheduler
cron
What does ICMP stand for
Internet Control Message Protocol
Internet Console Management Protocol
Internet Control Management Protocol
Internation Computer Message Protocol
Internet Control Message Protocol
Firewalking typically involves
Sending packets through a firewall on a given port with an increasing TTL value
Sending packets through a firewall with an increasing port number
Sending TCP packets to a server with no flags set
Sending ARP requests to all possible IP addresses
Sending packets through a firewall on a given port with an increasing TTL value
On conviction on indictment, what is the maximum prison sentence for a breach of Section 2 of the CMA
5 years
2 years
12 years
10 years
5 years
Which of the following is an Information Security Standard?
ISO27001
ISO9001
ISO2023
ISO14001
ISO27001
Your Score
Score Label
Score Summary