Daily Multiple Choice Test

When using the inbuilt ping command to identify live hosts what is most useful
writing a loop to ping a target range
using hyper-threading to speed up the scan
having verbose output
outputing results into a file
writing a loop to ping a target range
Which protocol establishes authentication via the use of tickets?
Kerberos
LDAP
HTTP
NFS
Kerberos
Under CMA is it a crime to view the source code of a web application
no
yes
yes if its encoded
yes if it uses TLS
no
On conviction on indictment, which offence carries the highest potential prison sentence
Section 3
Section 2
Section 3A
Section 6
Section 3
What layer of the OSI model does ARP operate on
layer 2
layer 3
layer 7
layer 4
layer 2
When was the Data Protection Act last updated
2018
1998
2002
2022
2018
In what type of attack does an intruder manipulate a URL in such a way that the Web server executes or reveals the contents of a file anywhere on the server, including those lying outside the document root directory?
path traversal attacks
Cross-Site Scripting
command injection
SQL injection
path traversal attacks
WEP IV packets are what size
3 bytes
8 bytes
24 bytes
0 bytes
3 bytes
Which of the following is a valid mode of operation for the IPSec protocol?
Tunnel mode
Multicast mode
Remote connection mode
Host-to-network transport mode
Tunnel mode
If a compromised windows machine stores passwords in both LM and NTLM hashing formats, which would be better to crack
LM as passwords will have a maximum character length of 7
NTLM because the hashing algorithm is more efficient
LM because it uses the DES algorithm
NTLM because GPU cracking can be used
LM as passwords will have a maximum character length of 7
Your Score
Score Label
Score Summary