Daily Multiple Choice Test

How many addresses are in the following network /29
8
2
4
1
8
What is the main difference betweem a worm and a virus?
worm is self replicating
A virus is easily removed
A worm is undetectable
A virus is larger
worm is self replicating
Which of the following is NOT recommended for securing Web applications against authenticated users?
Client-side data validation
Filtering data with a default deny regular expression
Running the application under least privileges necessary
Using parameterized queries to access a database
Client-side data validation
Which tool can be used to perform a DNS IP lookup of a specified host
nslookup
dquery
trace
Domain
nslookup
A hacker breaks into a banking system with the intent to transfer money into their account, which section of Computer Misuse Act is most aplicable to this activity
2
1
3
none
2
Can server responses be intercepted by BurpSuite
yes
no
Servers don’t give any response
BurpSuite doesn’t intercept anything
yes
What is a benefit of public key encryption compared to symmetric encryption
It does not require a secure exchange of a password
It is less computationally expensive
It does not use symmetric key algorithms
Key lengths are typically shorter
It does not require a secure exchange of a password
Which of the following commands would brute force files on a tftp server?
tftpbrute.pl <IP> wordlist.txt
tftp <IP> -I wordlist.txt
tftp <IP> -w wordlist.txt
tftpscan.py <IP> wordlist.txt
tftpbrute.pl <IP> wordlist.txt
If a compromised windows machine stores passwords in both LM and NTLM hashing formats, which would be better to crack
LM as passwords will have a maximum character length of 7
NTLM because the hashing algorithm is more efficient
LM because it uses the DES algorithm
NTLM because GPU cracking can be used
LM as passwords will have a maximum character length of 7
Which wireless protocol is attacked by gathering IV packets
WEP
WPA
WPA3
Ethernet
WEP
Your Score
Score Label
Score Summary