Security tools that are widely used are :
a. Nmap
b. WebInspect
c. Network Strumbler
d. All of the above

1 Answer

Answer :

d. All of the above

Related questions

Description : Security tools that are widely used are : a. Nmap b. WebInspect c. Network Strumbler d. All of the above

Last Answer : Security tools that are widely used are : a. Nmap b. WebInspect c. Network Strumbler d. All of the above

Description : Which of the following tool is used for security checks as port scanning and firewall testing? A. Netcat B. Nmap C. Data communication D. Netscan

Last Answer : A. Netcat

Description : 6 NMAP known as: A)Network Mapper B)NetCat C)SuperScan D)NetScan

Last Answer : A)Network Mapper

Description : Which of the following is not a network testing and port scanning tool? a. Nmap b. SuperScan c. John the ripper d. NetCat

Last Answer : c. John the ripper

Description : NMAP known as: A)Network Mapper B)NetCat C)SuperScan D)NetScan

Last Answer : A)Network Mapper

Description : Which Nmap scan is does not completely open a TCP connection? A. SYN stealth scan B. TCP scan C. XMAS tree scan D. ACK scan

Last Answer : A. SYN stealth scan

Description : __________ security consultants uses database security monitoring & scanning tools to maintain security to different data residing in the database / servers / cloud. a) Database b) Network c) System d) Hardware

Last Answer : d) Hardware

Description : Which among the following is correct features about LAN (Local Area Network): a) LANs are small size networks which only covers a few buildings or a campus up to few kilometers. b) LANs are widely used to connect ... to share printers in a Lab or in a department. d) None of These e) All of the Above

Last Answer : e) All of the Above

Description : The amateur or newbie in the field of hacking who don’t have many skills about coding and in-depth working of security and hacking tools are called ________ a) Sponsored Hackers b) Hactivists c) Script Kiddies d) Whistle Blowers

Last Answer : d) Whistle Blowers

Description : An argument for including computer forensic training computer security specialists is: a. It provides an additional credential. b. It provides them with the tools to conduct their own investigations. c. It teaches them when it is time to call in law enforcement. d. None of the above.

Last Answer : c. It teaches them when it is time to call in law enforcement.

Description : The amateur or newbie in the field of hacking who don’t have many skills about coding and in-depth working of security and hacking tools are called ________ a) Sponsored Hackers b) Hactivists c) Script Kiddies d) Whistle Blowers

Last Answer : c) Script Kiddies

Description : Network Testing and port scanning tools are : a. Sam Spade b. SuperScan c. NetScan d. All of the above

Last Answer : d. All of the above

Description : Find the false statement: (A) In Modern Cryptography, symmetric key algorithms use same key both for Encryption and Decryption. (B) The Symmetric cipher DES (Data Encryption Standard) was widely used ... and 124 bits. (D) Public key algorithms use two different keys for Encryption and Decryption.

Last Answer : (C) The AES (Advanced Encryption Standard) cryptosystem allows variable key lengths of size 56 bits and 124 bits.

Description : What are the names of the most widely used hardware resources in the network ?

Last Answer : The most widely used hardware resources in the network are: 1 / Printer 2 / Fax 3 / Modem 4 / Scanner.

Description : Point out the wrong statement. CSE-R17.BLOGSPOT.COM a) SOA provides the standards that transport the messages and makes the infrastructure to support it possible b) SOA provides access ... and widely shareable components that can minimize developer and infrastructure costs d) None of the mentioned

Last Answer : SOA provides access to reusable Web services over an SMTP network

Description : Point out the wrong statement. a) SOA provides the standards that transport the messages and makes the infrastructure to support it possible b) SOA provides access to reusable Web services ... widely shareable components that can minimize developer and infrastructure costs d) None of the mentioned

Last Answer : SOA provides access to reusable Web services over an SMTP network

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : A firewall is a network security system ______based that controls incoming and outgoing network traffic based on a set of rules: a) Hardware b) Software c) Both hardware or software d) None of These

Last Answer : c) Both hardware or software

Description : _____ is unauthorized access to or use of data, systems, server or networks including any attempt to probe scan or test the vulnerability of a system, server or network or to breach security or authentication ... the system, server or network: a) Hacking b) Cracking c) Viruses d) None of These

Last Answer : a) Hacking

Description : The............................. Is a collection of protocols designed by Internet Engineering TaskForce(IETF) to provide security for a packet at the Network level. A) IPsec B) Netsec C) Packetsec D) Protocolsec

Last Answer : A) IPsec

Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks A) ... v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : B) i, iii, iv and v only

Description : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Last Answer : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Description : Who are use their skill to identify security problem with computer network A)Black Hat Hacker B)Ethical Hacker C)Grey Hat hacker D)Script Kiddies

Last Answer : B)Ethical Hacker

Description : . A security audit performed on the internal network of an organization by the network administration is also known as ___________. A. Grey-box testing B. Black-box testing C. White-box testing D. Active testing

Last Answer : C. White-box testing

Description : Which of the following are the foundation of all the technical security issues in your information systems? a. Network Infrastructure vulnerabilities b. Information vulnerabilities c. System Infrastructure vulnerabilities d. Network Information vulnerabilities

Last Answer : a. Network Infrastructure vulnerabilities

Description : SATAN stands for_ a. Security Advanced Tool for Analysis Networks b. Security Admin Tool for Analysis Networks c. Security Administrator Tool for Analysis Networks d. Security Administrator Tool for Analysing Network

Last Answer : c. Security Administrator Tool for Analysis Networks

Description : Select the most appropriate definition of Ethical hacking. a. Ethical hacking is the science of testing computer and network for security vulnerabilities and plugging the hole before the viruses ... for security vulnerabilities and plugging the hole before the viruses get chance to handle them.

Last Answer : c. Ethical hacking is the science of testing computer and network for security vulnerabilities and plugging the hole before the unauthorized peoples get a chance to exploit them.

Description : A security audit performed on the internal network of an organization by the network administration is also known as ___________. a. Grey-box testing b. Black-box testing c. White-box testing d. Active testing E. Passive testing

Last Answer : c. White-box testing

Description : A security audit performed on the internal network of an organization by the network administration is also known as ___________. A. Grey-box testing B. Black-box testing C. White-box testing D. Active testing E. Passive testing

Last Answer : C. White-box testing

Description : Role of security auditor is to ____________ a) secure the network b) probe for safety and security of organization’s security components and systems c) detects and prevents cyber attacks and threats to organization d) does penetration testing on different web applications

Last Answer : b) probe for safety and security of organization’s security components and systems

Description : A security audit performed on the internal network of an organization by the network administration is also known as ___________. ∙ A. Grey-box testing ∙ B. Black-box testing ∙ C. White-box testing ∙ D. Active testing ∙ E. Passive testing

Last Answer : C. White-box testing

Description : Who are use their skill to identify security problem with computer network A)Black Hat Hacker B)Ethical Hacker C)Grey Hat hacker D)Script Kiddies

Last Answer : B)Ethical Hacker

Description : Defects discovered by static analysis tools include: i. Variables that are never used. ii. Security vulnerabilities. iii. Programming Standard Violations iv. Uncalled functions and procedures a) i , ii,iii,iv is correct b ... ,iv are incorrect. c) i ,ii, iii and iv are incorrect d) iv, ii is correct

Last Answer : a) i , ii,iii,iv is correct

Description : The intelligent agent paradigm became widely acceptable during the period of _____: a) 1980s b) 1990s c) 1960s d) None of These

Last Answer : b) 1990s

Description : The most widely used commercial programming computer language is 1) BASIC 2) COBOL 3) FORTRAN 4) PASCAL

Last Answer : 2) COBOL

Description : 7 Which OS is widely used in the world A)Windows B)LINUX C)IOS D)NONE

Last Answer : A)Windows

Description : Which OS is widely used in the world A)Windows B)LINUX C)IOS D)NONE

Last Answer : A)Windows

Description : Which among the following standard protocols is the most widely used by the Internet ? (1) HTTP (2) TCP/IP (3) SMTP (4) SLIP

Last Answer : TCP/IP

Description : What do you mean by cloud in cloud computing? A. Data exchanged among grid nodes. B. Provides tools to monitor and distribute the number of licenses. C. Provides logical view of data. D. Set of hardware, software, network, storage, services and interfaces.

Last Answer : Set of hardware, software, network, storage, services and interfaces.

Description : Which of the following are issues associated with SaaS? A. Modest software tools B. Network dependence C. Centralized management and data D. Multitenant solutions

Last Answer : Network dependence

Description : What menu is selected to cut, copy, and paste? 1) File 3 2) Tools 3) Special 4) Edit 5) None

Last Answer : Answer :4

Description : TCP stands for: a) Tools Control Protocol b) Transmission Control Protocol c) Transfer Control Protocol d) None of These

Last Answer : b) Transmission Control Protocol

Description : TCP stands for: a) Tools Control Protocol b) Transmission Control Protocol c) Transfer Control Protocol d) None of These

Last Answer : b) Transmission Control Protocol

Description : How do you prevent emailed word documents from always opening in the Reading Layout? 1) From the Tools Menu > Options > General Tab > uncheck the Allow starting in Reading Layout' 2) From the View ... Menu > Autoformat > Edit Tab > uncheck the `Use with emailed attachments'. 4) All the above

Last Answer : 1) From the Tools Menu > Options > General Tab > uncheck the Allow starting in Reading Layout'

Description : Which among the following are the best tools for Fixing errors on disks? 1) FDISK 2) SCANDISK 3) CHKDSK 4) FIXDSK

Last Answer : 2) SCANDISK

Description : Which among the following are the best tools for Fixing errors on disks? 1 FDISK 2 SCANDISK 3 CHKDSK 4 FIXDSK

Last Answer : 2 SCANDISK

Description : ___________ has now evolved to be one of the most popular automated tools for unethical hacking. a) Automated apps b) Database software c) Malware d) Worms

Last Answer : c) Malware

Description : What is Digital Forensic? A. Process of using scientific knowledge in analysis and presentation of evidence in court B. The application of computer science and investigative procedures for a legal ... technology in the investigation and establishment of the facts or evidence in a court of law

Last Answer : B. The application of computer science and investigative procedures for a legal purpose involving the analysis of digital evidence after proper search authority, chain of custody, validation with mathematics, use of validated tools, repeatability, reporting, and possible expert presentation

Description : Tools used by ethical hackers……….. a. Scanner b. Decoder c. Proxy d. All of these

Last Answer : a. Scanner