Tuesday 31 January 2012

Computer Examination Quiz[Simple Quiz For Practise]


PRACTICE QUESTIONS SET 1
1. One megabyte equals approximately
1) 1,000 bits
2) 1,000 bytes
3) 1 million bytes
4) 1 million bits
5) 2,000 bytes

2. Data going into the computer is called?
1) Output
2) Algorithm
3) Input
4) Calculations
5) Flowchart

3. Which of the following refers to the memory in your computer?
1) RAM
2) DSL
3) USB
4) LAN
5) CPU

4. When you are working on a document on PC, where is the
document temporarily stored?
1) RAM
2) ROM
3) The CPU
4) Flash memory
5) The CD-Rom

5. Information travels between components on the mother board
through-
1) Flash memory
2) CMOS
3)Bays
4) Buses
5) Peripherals

6. How are data organised in a spreadsheet?
1) Lines and spaces
2) Layers and planes
3) Height and width
4) Rows and columns
5) None of these

7. Which of the following is true?
1) Byte is a single digit in a binary number
2) Bit represents a grouping of digital numbers
3) Eight-digit binary number is called a byte
4) Eight-digit binary number is called a bit
5) None of these

8. Transformation of input into output is performed by?
1) Peripherals
2) Memory
3) Storage
4) The Input-Output unit
5) The CPU

9. How many options does a binary choice offer?
1) None
2) One
3) Two
4) It depends on the amount of memory in the computer
5) It depends on the speed of the computer's processor

10.   .....is collection of web pages and ......is the very first page that
we see on opening of a web-site

1) Home-page, Web-page
2) Web-site, Home-page
3) Web-page, Home-page
4) Web-page, Web-site
5) None of these

11. When the pointer is positioned on a _____ it is shaped like a
hand.
1) Grammar error
2) Hyperlink
3) Screen tip
4) Spelling error
5) Formatting error

12. The _____ of a system includes the programs or instructions.
1) Hardware
2) Icon
3) Information
4) Software
5) None of these

13. 'www' stands for _____
1) World Word Web
2) World Wide Web
3) World White Web
4) World Work Web
5) None of these

14. What menu is selected to cut, copy, and paste?
1) File
2) Tools
3) Special
4) Edit
5) None

15. You can use the tab key to
1) Move a cursor across the screen
2) Indent a paragraph
3) Move the cursor down the screen
4) Only (1) and (2)
5) None of these

16. The most important or powerful computer in a typical network is
_____
1) Desktop
2) Network client
3) Network server
4) Network station
5) None of these

17. Which of the following is an example of connectivity?
1) Internet
2) Floppy disk
3) Power cord
4) Data
5) None of these

18. The ability to find an individual item in a file immediately _____
is used.
1) File allocation table
2) Directory
3) Sequential access
4) Direct access
5) None of these

19. The primary purpose of software is to turn data into _____
1) Web sites
2) Information
3) Programs
4) Objects
5) None of these

20. To what temporary area can you store text and other data, and
later paste them to another location?
1) The clipboard
2) ROM
3) CD-ROM
4) The hard disk
5) None of these

21. Storage that retains its data after the power is tuned off is
referred to as
1) volatile storage
2) non-volatile storage
3) sequential storage
4) direct storage
5) None of these

22. _____is the science that attempts to produce machines that
display the same type of intelligence that humans do.
1) Nano science
2) Nanotechnology
3) Simulation
4) Artificial intelligence (AI)
5) None of these

23. Changing an existing document is called _____ the document.
5
1) Creating
2) Editing
3) Modifying
4) Adjusting
5) None of these

24. Computers use the _____ number system to store data and
perform calculations.
1) Decimal
2) Hexadecimal
3) Octal
4) Binary
5) None of these

25. Which of the following is the largest unit of storage?
1) GB
2) KB
3) MB
4) TB
5) None of these

26. The _____ key will launch the start buttons.
1) Esc
2) Shift
3) Windows
4) Shortcut
5) None of these

27. _____is the process of finding errors in software code.
1) Compiling
2) Testing
3) Running
4) Debugging
5) None of these

28. To move to the beginning of a line of text, press the _____ key.
1) Home
2) A
3) Page-up
4) Enter
5) None of these

29. Virtual memory is
1) Memory on the hard disk that the CPU uses as an extended RAM
2) RAM
3) Only necessary if you do not have any RAM in your computer
4) A back up device for floppy disks
5) None of these

30. A _____ contains specific rules and words that express the
logical steps of an algorithm.
1) Syntax
2) Programming structure
3) Programming language
4) Logic chart
5) None of these

31. When sending an e-mail, the _____ line describes the contents
of the message.
1) to
2) subject
3) contents
4) CC
5) None of these

32. The _____ tells the computer how to use its components.
1) Utility
2) Network
3) Operating system
4) Application program
5) None of these

33. Which grouping do you work with when formatting text in word?
1) Tables, paragraphs and indexes
2) Paragraphs, indexes and sections
3) Characters, sections and paragraphs
4) Indexes, characters and tables
5) None of these

34. What is backup?
1) Adding more components to your network
2) Protecting data by copying it from the original source to a
different destination
3) Filtering old data from the new data
4) Accessing data on tape
5) None of these

35. Network components are connected to the same cable in the
_____ topology.
1) Star
2) Ring
3) Bus
4) Mesh
5) Mixed

36. This component is required to process data into information and
consists of integrated circuits.
1) Hard disk
2) RAM
3) CPU
4) ROM
5) None of these

37. One advantage of dial-up-internet access is ___
1) It utilises broadband technology
2) It utilizes existing telephone service
3) It uses a router for security
4) Modem speeds are very fast
5) None of these

38. What is the term for unsolicited e-mail?
1) News group
2) Use net
3) Backbone
4) Flaming
5) Spam

39. Two or more computers connected to each other of sharing
information form a _____
1) Network
2) Router
3) Server
4) Tunnel
5) Pipeline

40. Computers that are portable and convenient for users who travel
are known as _____
1) Super computers
2) Lap tops
3) Mini computers
4) File servers
5) None of these

41. A computer checks the _____ of user names and passwords for
a match before granting access.
1) Website
2) Network
3) Backup file
4) Data base
5) None of these

42. Office LANs that are spread geographically apart on a large
scale can be connected using a corporate _____
1) CAN
2) LAN
3) DAN
4) WAN
5) TAN

43. The code for a Web page is written using _____
1) A fifth generation language
2) Win Zip
3) Peripherals
4) Hypertext Markup Language
5) URL

44. What is the process of copying software programs from
secondary storage media to the hard disk called?
1) Configuration
2) Download
3) Storage
4) Upload
5) Installation

45. Small application programs that run on a web page and may
ensure a form is completed properly or provide animation are known
as _____
1) Flash
2) Spiders
3) Cookies
4) Applets
5) Sparks

46. The first computers were programmed using _____
1) Assembly language
2) Machine language
3) Source code
4) Object code
5) Spaghetti code

47. Which process checks to ensure the components of the
computer and operating are connected properly?
1) Booting
2) Processing
3) Saving
4) Editing
5) None of these

48. In a relational database, this is a data structure that organizes
the information about a single topic into rows and columns.
1) Block
2) Record
3) Tuple
4) Table
5) Command line interface

49. How can the user determine what programs are available on a
computer?
1) Checking the hard disk properties
2) Viewing the installed programs during the booting process
3) Checking the operating system for a list of installed programs.
4) Checking the existing files saved on the disk
5) None of these

50. When we run a program in HTML coding _____ is used as
backend and ____ works as front-end.
1) Notepad - Internet-Explorer
2) Notepad - Msn-messenger
3) MS-Word - Internet Explorer
4) Both (1) and (2)
5) None of these

ANSWERS:
1)3  2)3  3)1  4)1  5)4  6)3  7)3  8)5  9)3  10)2  11)2  12)4  13)2  14)4  15)2
16)3  17)1  18)1  19)2  20)1  21)2  22)4  23)2  24)4  25)4  26)3  27)4  28)1
29)2  30)3  31)2  32)3  33)1  34)2  35)2  36)3  37)2  38)5  39)1  40)2  41)4
42)4  43)4  44)5  45)4  46)2  47)1  48)4  49)4  50)1

Monday 30 January 2012

Basic Computer Hardware and Networking Course



Basic Computer Hardware and Networking Course


COURSE CONTENT


Day 1,2 

 1 .Computer Fundamentals
 2. Introduction to Computers
 3. Types of Computers
 4. Introduction to Input Output Devices
 5. Introduction to Storage Devices
 6. Principals of Data Communication


Day 3,4,5

 7. Hardware Configuration
 8. Introduction to basic components of a typical PC
 9. Assembling a PC
10.Installing Operating System
11.Basic Trouble shooting during the assembling
12.Basic troubleshooting of PC


Day 6,7,8,9,10,11,12,13

13. Networking Fundamentals & Network Configuration
14. Introduction to various types of cables and connectors used in networking
 15. Introduction to networking and networking concepts
16. The 7 Layer architecture
17. 7 Layer components
18. Repeaters, Hubs, Switches, Bridges, Routers
19. Hubs vs Switches
20. Installing the NIC Card, MAC Address
21. LAN Standards – Ethernet, Token Ring
22. Structured Cabling
23. LAN Practicals
24. IP Addressing and IP Classes
25. TCP/IP Concepts and configuration of IP Address
26. Joining computer to a AD Domain
27. Basic network troubleshooting


Day 14,15

28. Basics of network security



Sunday 29 January 2012

WEBSITE STRUCTURE[What type of things we Need to Consider Before Making Website]


WEBSITE STRUCTURE

       Homepage


  • First page that you show to a visitor; it’s like a face of a person
  • Make sure it looks good, attractive and descriptive because it’s the first impression to the visitors
  • It’s like an introduction of your page (it should have introduction to every links in the website)
  • Includes graphic & animation (flash)
  • Has name, logo, description (about 1-2 paragraphs) , contact info., etc.
  • Search engine looks at text only (not graphic and animation) 
  • So try to put your information in text as much as possible
  • Try to make your page the top ten website in search engine

- Contact Information

“Contact Us”

  • Includes company owner’s contact information or map to the company
  • Very important since it helps visitors to get in touch with the company
  • It is a place for the clients to send their own information

- Privacy Policy 

  • It’s the term of agreement about the purpose of the visitors’ collected data
  • Make the visitors feel secure and sincere
  • Ensures the visitors that their data will not be misused
  • Cookies are collected when visitors launch the website
  • When visitors log in to the website, the information of their computers will be collected and save in cookies file
  • Visitors information can be sold to the spammer
  • Product Service and Information
  • Produces are needed to be categorized 
  • Each category includes descriptions and information that attract visitors
  • Includes types of product and every information that is important (or interesting)
  • Must have permission to use any work with license 
  • Copy right content – ask the permission from the owner of company first
  • In your website, photo/image should be taken by yourself
  • If you take it from somewhere else, you need to get proper permission from the owner of those photos 
  • When you sell products, some people might now know how to operate them
  • You should provide after-sell service like putting the “How to” operate the product in your website
  • Services are important to the customers 

- Biography 

  • Tells personal information or history of the company
  • Helps people to understand how long the company is in the business
  • Longer time means higher experiences so the company provides better quality service/product
  • Not all type of website needs biography 
  • Video Broadcasts 
  • Helps use to tell information/advertisement/tutorial/produce service (How-to)
  • Makes visitors interest in your products
  • Provides technical support 

- Site maps 

  • Contains all links to every pages 
  • It’s like a navigator; it shows a structure of your website
  • Makes it friendly to search engine 
  • Gives visual structure of website

    -Footer
  • It’s at the bottom of the page
          Company name/copyright info./navigation link/contact info./privacy policy
     Company information (about us)

  • Describes company details/mission statement/philosophy/ biography/member of team/what can others benefit from you
  • Tells what you are doing and what will the visitors get in your website
  • Customer Service 
  • Visitors get more information about a service
  • Way to serve customers better
  • It provides delivery, return products, problems solution, etc. 
  • You can include a conversation box
  • The easier to use, the more customers you have (the more service is given to customers, the more the customers get more interest in you)
  • It’s a quick interaction between customers and company 
  • Provides fast service but there must be privacy policy (make sure the customers’ information will not be shared to everyone)

- HTML 

  • Follows website standard so that it’ll look organized
  • If you don’t follow the standard, you will ruin the design & content will be lost 
  • WP3  (Web standard) 
  • Make sure you follow the structure correctly or else your browser cannot display your website
  • Also make sure that every browser shows up your information correctly

- Site Credit

  • Advertises the name of the person who create the website (or who make the template)
  • Gives users/visitors more benefit
  • Attracts people to come to your site

- Portfolio

  • Media files/videos/MP3
  • It is the best way to market service 
  • Shares news/industrial information
  • Tells what your company is doing

- FAQ (Frequency Asked Questions)

  • Helps visitors for easier way to get information
  • Shows contact information and provides customer service
  • Questions & answers 
  • Helps customers solve problem about the products 

- Site search

  • Eg. www.google.com
  • Not require but can make visitors stay in your site longer
  • Visitors can search for your entire website (using key words that they type)
-   Terms of Service 

  • States how site provides service
  • Includes concept/rights/usage registration/security/etc. 
  • Tells conditions under which service is giving. 



Content pages (in folder)

  • Must have ‘footnote’ which includes… 
  • Title of the page (that will appear on the title bar)
  • Keyword (to help in search engine)
  • Description




Different Types oF Web Server Error Message[staus code]


Status Codes

Each HTTP response message must contain a status code in its first line, indicating the result of the request. The status codes fall into five groups, according to the code’s first digit:

  •  1xx — Informational.
  • 2xx — The request was successful.
  • 3xx — The client is redirected to a different resource.
  • 4xx — The request contains an error of some kind.
  • 5xx — The server encountered an error fulfilling the request.

There are numerous specific status codes, many of which are used only in
specialized circumstances. Here are the status codes you are most likely to
encounter during in some cases.


 100 Continue is sent in some circumstances when a client submits a
request containing a body. The response indicates that the request headers
were received and that the client should continue sending the body. The
server returns a second response when the request has been completed.

200  OK indicates that the request was successful and that the response
body contains the result of the request.

201 Created is returned in response to a PUT request to indicate that the
request was successful.

301 Moved Permanently redirects the browser permanently to a different
URL, which is specifi ed in the Location header. The client should use the
new URL in the future rather than the original.

302 Found redirects the browser temporarily to a different URL, which is
specified in the Location header. The client should revert to the original
URL in subsequent requests.

304 Not Modified instructs the browser to use its cached copy of the
requested resource. The server uses the If-Modified-Since and If-None-
Match request headers to determine whether the client has the latest version
of the resource.

400 Bad Request indicates that the client submitted an invalid HTTP request.
You will probably encounter this when you have modifi ed a request in
certain invalid ways, such as by placing a space character into the URL.


401 Unauthorized indicates that the server requires HTTP authentication
before the request will be granted. The WWW-Authenticate header contains
details on the type(s) of authentication supported.

403 Forbidden indicates that no one is allowed to access the requested
resource, regardless of authentication.
n 404 Not Found indicates that the requested resource does not exist.

405 Method Not Allowed indicates that the method used in the request is

not supported for the specifi ed URL. For example, you may receive this
status code if you attempt to use the PUT method where it is not supported.

413 Request Entity Too Large — If you are probing for buffer overfl ow

vulnerabilities in native code, and therefore are submitting long strings
of data, this indicates that the body of your request is too large for the
server to handle.

414 Request URI Too Long is similar to the 413 response. It indicates that

the URL used in the request is too large for the server to handle.

500 Internal Server Error indicates that the server encountered an

error fulfi lling the request. This normally occurs when you have submitted
unexpected input that caused an unhandled error somewhere within
the application’s processing. You should closely review the full contents
of the server’s response for any details indicating the nature of the error.

503 Service Unavailable normally indicates that, although the web

server itself is functioning and can respond to requests, the application
accessed via the server is not responding. You should verify whether this
is the result of any action you have performed.

Hope you like this post 

Certified Ethical Hacker Quiz 22


Question: 22

Which of the following Nmap commands would be used to perform a UDP scan of the lower 1024
ports?
A. Nmap -h -U
B. Nmap -hU <host(s.>
C. Nmap -sU -p 1-1024 <host(s.>
D. Nmap -u -v -w2 <host> 1-1024
E. Nmap -sS -O target/1024

Answer: C
Explanation:
Nmap -sU -p 1-1024 <host(s.> is the proper syntax. Learning Nmap and its switches are critical
for successful completion of the CEH exam.

Certified Ethical Hacker Quiz 21.


Question: 21

What is the tool Firewalk used for?
A. To exam the IDS for proper operation
B. To exam a firewall for proper operation
C. To determine what rules are in place for a firewall
D. To exam the webserver configuration
E. Firewalk is a firewall auto configuration tool

Answer: C

Explanation:
Firewalk is an active reconnaissance network security tool that attempts to determine what layer
4 protocols a given IP forwarding device "firewall" will pass. Firewalk works by sending out TCP
or UDP packets with a TTL one greater than the targeted gateway. If the gateway allows the
traffic, it will forward the packets to the next hop where they will expire and elicit an
ICMP_TIME_EXCEEDED message. If the gateway host does not allow the traffic, it will likely
drop the packets and no response will be returned.

Certified Ethical Hacker Quiz 20


Question: 20

The follows is an email header. What address is that of the true originator of the message?
Return-Path: <bgates@microsoft.com>
Received: from smtp.com (fw.emumail.com [215.52.220.122].
by raq-221-181.ev1.net (8.10.2/8.10.2. with ESMTP id h78NIn404807
for <mikeg@thesolutionfirm.com>; Sat, 9 Aug 2003 18:18:50 -0500
Received: (qmail 12685 invoked from network.; 8 Aug 2003 23:25:25 -0000
Received: from ([19.25.19.10].
by smtp.com with SMTP
Received: from unknown (HELO CHRISLAPTOP. (168.150.84.123.
by localhost with SMTP; 8 Aug 2003 23:25:01 -0000
From: "Bill Gates" <bgates@microsoft.com>
To: "mikeg" <mikeg@thesolutionfirm.com>
Subject: We need your help!
Date: Fri, 8 Aug 2003 19:12:28 -0400
Message-ID: <51.32.123.21@CHRISLAPTOP>
MIME-Version: 1.0
Content-Type: multipart/mixed;
boundary="----=_NextPart_000_0052_01C35DE1.03202950"
X-Priority: 3 (Normal.
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook, Build 10.0.2627
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2800.1165
Importance: Normal

A. 19.25.19.10
B. 51.32.123.21
C. 168.150.84.123
D. 215.52.220.122
E. 8.10.2/8.10.2


Answer: C

Explanation:
Spoofing can be easily achieved by manipulating the "from" name field, however, it is much more
difficult to hide the true source address. The "received from" IP address 168.150.84.123 is the
true source of the

Certified Ethical Hacker Quiz 19


Question: 19

Why would you consider sending an email to an address that you know does not exist within the company you are performing a Penetration Exam for?

A. To determine who is the holder of the root account
B. To perform a DoS
C. To create needless SPAM
D. To illicit a response back that will reveal information about email servers and how they treat
undeliverable mail
E. To exam for virus protection

Answer: D
Explanation:
Sending a bogus email is one way to find out more about internal servers. Also, to gather
additional IP addresses and learn how they treat mail.

Certified Ethical Hacker Quiz 18


Question: 18

When worsheets with Windows systems, what is the RID of the true administrator account?
A. 500
B. 501
C. 1000
D. 1001
E. 1024
F. 512

Answer: A

Explanation:
Because of the way in which Windows functions, the true administrator account always has a RID
of 500.

Certified Ethical Hacker Quiz 17


Question: 17

Which of the following tools are used for enumeration?(Choose three.
A. SolarWinds
B. USER2SID
C. Cheops
D. SID2USER
E. DumpSec


Answer: B, D, E

Explanation:
USER2SID, SID2USER, and DumpSec are three of the tools used for system enumeration.
Others are tools such as NAT and Enum. Knowing which tools are used in each step of the
hacsheets methodology is an important goal of the CEH exam. You should spend a portion of
your time preparing for the exam practicing with the tools and learning to understand their output.

Certified Ethical Hacker Quiz 16.


Question: 16

What did the following commands determine?
C: user2sid \earth guest
S-1-5-21-343818398-789336058-1343024091-501
C:sid2user 5 21 343818398 789336058 1343024091 500
Name is Joe
Domain is EARTH

A. That the Joe account has a SID of 500
B. These commands demonstrate that the guest account has NOT been disabled
C. These commands demonstrate that the guest account has been disabled
D. That the true administrator is Joe
E. Issued alone, these commands prove nothing

Answer: D

Explanation:
One important goal of enumeration is to determine who the true administrator is. In the example
above, the true administrator is Joe.

Certified Ethical Hacker Quiz 15.


Question: 15

Which of the following statements about a zone transfer correct?(Choose three)

A. A zone transfer is accomplished with the DNS
B. A zone transfer is accomplished with the nslookup service
C. A zone transfer passes all zone information that a DNS server maintains
D. A zone transfer passes all zone information that a nslookup server maintains
E. A zone transfer can be prevented by blocsheets all inbound TCP port 53 connections
F. Zone transfers cannot occur on the Internet


Answer: A, C, E

Explanation:
Securing DNS servers should be a priority of the organization. Hackers obtaining DNS
information can discover a wealth of information about an organization. This information can be
used to further exploit the network.

Certified Ethical Hacker Quiz 14.


Question: 14

While footprinting a network, what port/service should you look for to attempt a zone transfer?

A. 53 UDP
B. 53 TCP
C. 25 UDP
D. 25 TCP
E. 161 UDP
F. 22 TCP
G. 60 TCP


Answer: B
Explanation:
IF TCP port 53 is detected, the opportunity to attempt a zone transfer is there.

Certified Ethical Hacker Quiz 13.


Question: 13

NSLookup is a good tool to use to gain additional information about a target network. What does the following command accomplish?
   nslookup
> server <ipaddress>
> set type =any
> ls -d <target.com>


A. Enables DNS spoofing
B. Loads bogus entries into the DNS table
C. Verifies zone security
D. Performs a zone transfer
E. Resets the DNS cache

Answer: D
Explanation:
If DNS has not been properly secured, the command sequence displayed above will perform a
zone transfer.

Certified Ethical Hacker Quiz 12.


Question: 12

According to the CEH methodology, what is the next step to be performed after footprinting?

A. Enumeration
B. Scanning
C. System Hacsheets
D. Social Engineering
E. Expanding Influence


Answer: B
Explanation:
Once footprinting has been completed, scanning should be attempted next. Scanning should take
lace on two distinct levels: network and host.

Certified Ethical Hacker Quiz 11.


Question: 11

Which of the following tools are used for footprinting?

A. Sam Spade
B. NSLookup
C. Traceroute
D. Neotrace
E. Cheops

Answer: A, B, C, D

Explanation:
All of the tools listed are used for footprinting except Cheops.

Certified Ethical Hacker Quiz 10.


Question: 10

Your lab partner is trying to find out more information about a competitors web site. The site has a .com extension. She has decided to use some online whois tools and look in one of the regional Internet registrys.

Which one would you suggest she looks in first?
A. LACNIC
B. ARIN
C. APNIC
D. RIPE
E. AfriNIC


Answer: B

Explanation:
Regional registries maintain records from the areas from which they govern. ARIN is responsible
for domains served within North and South America and therefore, would be a good starting point for a .com domain.

Certified Ethical Hacker Quiz 9


Question: 9

What does the following command achieve?
Telnet <IP Address> <Port 80>
HEAD /HTTP/1.0
<Return>
<Return>

A. This command returns the home page for the IP address specified
B. This command opens a backdoor Telnet session to the IP address specified
C. This command returns the banner of the website specified by IP address
D. This command allows a hacker to determine the sites security
E. This command is bogus and will accomplish nothing


Answer: C

Explanation:
This command is used for banner grabbing. Banner grabbing helps identify the service and
version of web server running.

Certified Ethical Hacker Quiz 8.


Question: 8

Password cracsheets programs reverse the hashing process to recover passwords.(True/False)

A. True
B. False

Answer: B

Explanation:
Password cracsheets programs do not reverse the hashing process. Hashing is a one-way
process.
What these programs can do is to encrypt words, phrases, and characters using the same
encryption process and compare them to the original password. A hashed match reveals the true
password.

Certified Ethical Hacker Quiz 7.


Question: 7

Which of the following are well know password-cracsheets programs?

A. L0phtcrack
B. NetCat
C. Jack the Ripper
D. Netbus
E. John the Ripper

Answer: A, E

Explanation:
L0phtcrack and John the Ripper are two well know password-cracsheets programs. Netcat is
considered the Swiss-army knife of hacsheets tools, but is not used for password cracsheets

Certified Ethical Hacker Quiz 6.



Question: 6

When discussing passwords, what is considered a brute force attack?

A. You attempt every single possibility until you exhaust all possible combinations or discover the
password
B. You threaten to use the rubber hose on someone unless they reveal their password
C. You load a dictionary of words into your cracsheets program
D. You create hashes of a large number of words and compare it with the encrypted passwords
E. You wait until the password expires

Answer: A

Explanation:
Brute force cracsheets is a time consuming process where you try every possible combination of
letters, numbers, and characters until you discover a match.

Certified Ethical Hacker Quiz 5.


Question: 5

Sniffing is considered an active attack.

A. True
B. False


Answer: B

Explanation:
Sniffing is considered a passive attack.

Certified Ethical Hacker Quiz 4.


Question: 4

What are the two basic types of attacks?

A. DoS
B. Passive
C. Sniffing
D. Active
E. Cracsheets

Answer: B, D
Explanation:
Passive and active attacks are the two basic types of attacks.

Certified Ethical Hacker Quiz 3.



Question: 3

Several of your co-workers are having a discussion over the etc/passwd file. They are at odds
over what types of encryption are used to secure Linux passwords.(Choose all that apply).

A. Linux passwords can be encrypted with MD5
B. Linux passwords can be encrypted with SHA
C. Linux passwords can be encrypted with DES
D. Linux passwords can be encrypted with Blowfish
E. Linux passwords are encrypted with asymmetric algrothims

Answer: A, C D

Explanation:
Linux passwords can be encrypted with several types of hashing algorithms. These include SHQ,
MD5, and Blowfish.

Certified Ethical Hacker Quiz 2.


Question: 2

How can you determine if an LM hash you extracted contains a password that is less than 8
characters long?

A. There is no way to tell because a hash cannot be reversed
B. The right most portion of the hash is always the same
C. The hash always starts with AB923D
D. The left most portion of the hash is always the same
E. A portion of the hash will be all 0's


Answer: B

Explanation:
When loosheets at an extracted LM hash, you will sometimes observe that the right most portion
is always the same. This is padding that has been added to a password that is less than 8
characters long.

Certified Ethical Hacker Quiz 1.


Question: 1

What is the name of the software tool used to crack a single account on Netware Servers using a dictionary attack?


A. NPWCrack
B. NWPCrack
C. NovCrack
D. CrackNov
E. GetCrack


Answer: B
Explanation:
NWPCrack is the software tool used to crack single accounts on Netware servers.