Daily Multiple Choice Test

In x86 assembly, what is the value of a NOP (No Operation) instruction
x90
x60
x40
x128
x90
Which layer of the OSI Model users the TCP protocol
layer 4
layer 2
layer 6
layer 8
layer 4
What does CVE stand for
Common Vulnerabilities and Exposures
Creative Vulnerabilities Exposed
Certified Vulnerable Expert
Compliance Verification Expert
Common Vulnerabilities and Exposures
Can server responses be intercepted by BurpSuite
yes
no
Servers don’t give any response
BurpSuite doesn’t intercept anything
yes
to conduct a ping sweep which flag would be used
-sn
-sS
-sP
-sI
-sn
Which of the following is omitted from IPv6
Broadcasts
SSIDs
DNS
NAT
Broadcasts
For section 2 of the computer misuse act to have been broken the following is true
The crime conducted after the unauthorised access does not *have* to use a computer
The crime conducted after the unauthorised access *has* to use a computer
The crime conducted after the unauthorised access has to be conducted by the same person
There must be a negative impact to a computer or data for a breach of CMA section 2
The crime conducted after the unauthorised access does not *have* to use a computer
If a bi-directional trust relationship has been created between domain A and domain B which of the following is correct
If the domain admin in domain A is compromised, then the domain admin in domain B is also compromised
If a local admin in domain A is compromised, then the domain admin in domain A is also compromised
If a local admin in domain A is compromised, then the domain admin in domain B is also compromised
If the domain admin in domain A is compromised, then the domain admin in domain B is not compromised
If the domain admin in domain A is compromised, then the domain admin in domain B is also compromised
What kind of attack would impact the A in CIA
DoS
MitM
Shouldersurfing
Phishing
DoS
What is the legal age of consent for data processing under the Data Protection Act
13
16
18
21
13
Your Score
Score Label
Score Summary