CSEC 701 Quizzes

0.0(0)
studied byStudied by 0 people
0.0(0)
call with kaiCall with Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/29

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 7:11 PM on 12/10/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

30 Terms

1
New cards

The following tasks except one are performed by TCP. Find the one that is not the function of TCP.

multicasting

2
New cards

TCP connection is established by 3-way handshaking process. What are the TCP flags involved in the second step?

SYN-ACK

3
New cards

Bob is attempting to sniff a wired network in his first pen test contract. He sees only the traffic from the segment he is connected to. What can Bob do to gather all switch traffic?

MAC flooding

4
New cards

ARP is a protocol for mapping a MAC address to an IP address. Each host keeps an ARP table for the mapping and ARP cache poisoning attack aims to inject false information into that cache. What method or protocol is used for injecting false information?

gratuitous ARP

5
New cards

Many sniffing attacks can lead to a man in the middle MITM attack. Which of the following attacks does not lead t MITM

DHCP starvation attack

6
New cards

in DNS cache poisoning attack, the attacker must collect some information in advance from the target DNS server. What is it?

current Query ID

7
New cards

in Nmap half-open scan, which step is missing from the full scan?

ACK

8
New cards

firewalls commonly block the traffic that is initiated from outside. Because of that, Nmap probe packets may not penetrate the firewall. Nmap uses a couple of techniques to work around it. Which one of these techniques Nmap uses?

ACK scanning

9
New cards

which TCP flag are used during Xmas scan?

FUN, URG, PSH

10
New cards

IP fragmentation attack breaks an IP packet into multiple pieces. What is the purpose of it?

to avoid detection by IDS

11
New cards

which of the following tools perform vulnerability scanning and compliance auditing?

Nessus

12
New cards

What is the purpose of using web manipulation proxy?

to change the content of the web response page

13
New cards

What benefits can you get by using ToR?

you can hide your true IP address

14
New cards

Typical buffer overflow attack has a NOP sled. What is the purpose of it?

to overcome the ambiguity of the exploit code location

15
New cards

Penetration testing is a localized, time-constrained, and authorized attempt to breach the information security. Which of the following tools will be most relevant for conducting penetration testing?

Metasploit

16
New cards

Among the security goals, which one is mostly affected by DoS or DDoS attack?

availability

17
New cards

Which of the following network attacks relies on sending abnormally large packet sizes that exceeds TCP/IP specifications?

Ping of death

18
New cards

Which DoS/DDoS attack does not rely on zombie machines?

teardrop attack

19
New cards

in SYN flooding attack, the attacker sends many SYN packets to a victim with a spoofed source IP address. Then the victim machine replies with SYN-ACK packets. Why is the SYN flooding attack bad?

it fills up the TCP buffer memory

20
New cards

LInux uses TCP SYN cookie to prevent SYN flooding attack. SYN cookie does not introduce a new field in IP or TCP header. Instead, it uses an existing field in the TCP header. What is it?

servers initial sequence number (32 bit)

21
New cards

There are two types of IPsec headers, AH (authentication header) and ESP (encapsulated security payload), what is the major difference between them?

ESP allows encryption

22
New cards

IPsec transport mode is used between two hosts. Which one of the following is the correct explanation of the IPsec transport mode?

the real IP addresses of the hosts are visible

23
New cards

in IKE, which public key algorithm is used for key exchange in a modified form?

Diffie-Hellman DH

24
New cards

Although TLS 1.2 protocol is not interoperable with SSL, it still follows the SSL version numbers. What is the corresponding SSL version number for TLS 1.2?

SSL 3.3

25
New cards

in SSL (up to TLS 1.2), there are 4 phases for handshaking. In phase 3, in case of RSA, the client sends a 48-byte pre-master secret that is encrypted to avoid eavesdropping. With which key is it encrypted?

servers public key

26
New cards

in TLS 1.1 and up, there is a field called SNI (server name indication). What is the purpose of this field?

to allow multiple domain names to be served by the same IP address

27
New cards

Perfect forward secrecy assures that session keys are not compromised even if long-term secrets are compromised. TLS 1.2 based on RSA method does not support perfect forward secrecy. How is it solved in TLS 1.3?

by using an ephemeral key for each connection

28
New cards

HTTP strict transport security HSTS is an IETF standard and a mechanism to enforce rules to prevent browsers from downgrading security. Which attack against SSL/TLS can it prevent?

SSL stripping

29
New cards

SSH transport layer performs server authentication. Which of the following method is not employed for this purpose?

Kerberos

30
New cards

SSH user authentication can be done using a public key. To use it, which key must a user store on the server?

RSA public key