Daily Multiple Choice Test

A fully established UDP handshake consists of which of the following?
There is no handshake
SYN | SYN | SYN-ACK
SYN | ACK | SYN | ACK
SYN | SYN-ACK | ACK
There is no handshake
What file permission is commonly used to allow anyone to "use" a program without being able to make modifications to it?
755
775
555
444
755
to conduct a ping sweep which flag would be used
-sn
-sS
-sP
-sI
-sn
In an environment using Dynamic Access control, who controls access to assets?
Asset owners
A central authority
No-one, all users can access all assets
The CEO
Asset owners
What does HSTS stand for?
HTTP Strict Transport Security
Hyperlink Security Transport Secure
HTTP Secure Tunnel Security
Hidden Security Transport System
HTTP Strict Transport Security
What command is used to understand what a metasploit module will do during execution
info
show options
check
run
info
Which of the following is the terminology used to define an organisation that determines the use of personal data
controller
processor
commission
authority
controller
Which of the following are most vulnerable to injection attacks?
SQL queries based on user input
Registry Keys
Network Communications
Session IDs
SQL queries based on user input
How do you prevent packet-sniffing exploits?
Encrypt network communication with SSL
Escape packet text
Scan for viruses
Packet plugs
Encrypt network communication with SSL
You have just completed a port scan and found ports 80/tcp and 9100/tcp open a host, what is this host likely to be?
A printer
A switch
A router
A Playstation
A printer
Your Score
Score Label
Score Summary