Daily Multiple Choice Test

Which unpatched version of Solaris are vulnerable to the l-froot Telnet authentication bypass
SunOS 5.10 & SunOS 5.11
SunOS 5.6
SunOS 5.8
SunOS 5.12
SunOS 5.10 & SunOS 5.11
What is the default network mask used by most consummer grade network devices
255.255.255.0
255.255.252.0
255.255.255.255
0.0.0.0
255.255.255.0
which flag can be used to define the source port of an nmap scan
-g
-v
-s
-p
-g
With regard to security issues associated with TFTP, which of the following assertions is true?
TFTP does not require authentication
TFTP makes uses of biometrics for authentication
TFTP makes use of digital signature for authentication
TFTP uses simple passwords authentication
TFTP does not require authentication
What does OSI stand for?
Open Systems Interconnection
Operating System Information
Open Source Intelligence
Operating Standands Information
Open Systems Interconnection
If a UK based hacker attacks a company in Sweden, would they have broken the Computer Misuse Act
yes
no as the target is in Sweden
It depends whether they used a VPN
it is not possible to identify attacks targeting other countries
yes
how many ports are scanned when using the -F flag
100
1000
10
10000
100
A cisco type 7 password uses which of the following
Vigenere
SHA256
MD5
Scrypt
Vigenere
What is the HSRP protocol
Hot Standby Routing Protocol
High Speed Routing Protocol
Head Server Reserve Protocol
High Security Routing Protocol
Hot Standby Routing Protocol
which command will scan ports 21, 53 and 80
nmap -p [21,53,80] 192.168.1.1
nmap 192.168.1.1 -p(21,53,80)
nmap -p [21,53,80] 192.168.1.1
Your Score
Score Label
Score Summary