SCS: Laboratory Final Exam
Started onTuesday, 8 January 2013, 2:03 PM
StateFinished
Completed onTuesday, 8 January 2013, 2:56 PM
Time taken52 mins 48 secs
Grade29.35 out of a maximum of 40.00 (73%)
Feedback

The test is passed

Question 1

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which phase of penetration tests engage the following methods of penetration?

Gathering general information from WWW, press, blogs, mailing lists, the usage of Web search engines, querying WHOIS databases, querying DNS, host reachability.
Select one:
Correct

Feedback

Question 2

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Your personal firewall has the following active rule defined:

direction: incomming,
protocol: tcp,
port: 80.
action: block.

You can not download any website usign http. Is that true? 

Select one:
Correct

Feedback

Question 3

Correct
Mark 1.00 out of 1.00
Flag question

Question text

In which layer of TCP/IP suite you can find the Domain Name System?
Select one:
Correct

Feedback

Question 4

Correct
Mark 1.00 out of 1.00
Flag question

Question text

To use remote resources in a safety way, you would suggest using:
Select one:
Correct

Feedback

Question 5

Correct
Mark 1.00 out of 1.00
Flag question

Question text

The positive feature of IPSec is that its deployment is transparent to the user.

Select one:
Correct

Feedback

Question 6

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Resolve the abbreviation VPN.
Select one:
Correct

Feedback

Question 7

Correct
Mark 1.00 out of 1.00
Flag question

Question text

The purpose of Security Parameter Index is to:
Select one:
Correct

Feedback

Question 8

Partially correct
Mark 0.60 out of 1.00
Flag question

Question text

How to resist DoS attacks?
Select one or more:
Correct
Correct
Correct

Feedback

Question 9

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

How does Stealth FIN scanning method work?
Select one:
Incorrect

Feedback

Question 10

Partially correct
Mark 0.75 out of 1.00
Flag question

Question text

Which of the following are symmetric cryptographic algorithms:
(Three answers are correct)
Select one or more:
Correct
Incorrect
Correct
Correct

Feedback

Question 11

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Indicate the false sentence:
(Two answers are correct)
Select one or more:
Correct
Correct

Feedback

Question 12

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What type of encryption is considered more secure: symmetric or asymmetric?
Select one:
Correct

Feedback

Question 13

Correct
Mark 1.00 out of 1.00
Flag question

Question text

In this attack the offender is sending ICMP Echo Request  malformed packets with the spoofed source IP address set to the network broadcast address and the destination IP address pointing to the victim. This could lead to: 

-network bandwidth exhaustion (usually temporal),
-blockade of the victim's machine (which is flooded by ICMP Echo Reply).

This attack is called:
Select one:
Correct

Feedback

Question 14

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Which of the following are valid TCP flags?
(Three answers are correct)
Select one or more:
Incorrect
Correct
Incorrect

Feedback

Question 15

Correct
Mark 1.00 out of 1.00
Flag question

Question text

To assure confidentially of the message contents one should:
Select one:
Correct

Feedback

Question 16

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Indicate the false sentence:
(Two answers are correct)
Select one or more:
Correct
Correct

Feedback

Question 17

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Your personal firewall has the following active rule defined:

direction: outgoing,
protocol: udp,
port: 80.
action: block.

You can normally download websites using http. Is that true? 

Select one:
Incorrect

Feedback

Question 18

Correct
Mark 1.00 out of 1.00
Flag question

Question text

The purpose of message encrypting is to assure confidentially of the message sender, isn't it?
Select one:
Correct

Feedback

Question 19

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

In Virtual Private Networks concept, before virtual connection establishment, a client does not have to have physical (real) connection to the server.

Select one:
Incorrect

Feedback

Question 20

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which DNS record stands for an alias of a domain?
Select one:
Correct

Feedback

Question 21

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Indicate the true sentence regarding cryptographic key.
Select one:
Incorrect

Feedback

Question 22

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Select proper types of firewall.
(Two answers are correct)
Select one or more:
Correct
Correct

Feedback

Question 23

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Explain what the NSLOOKUP tool enables?
Select one or more:
Correct
Correct

Feedback

Question 24

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

The network protocol that encapsulates a different protocol is called?
Select one:
Incorrect

Feedback

Question 25

Correct
Mark 1.00 out of 1.00
Flag question

Question text

The authentication approach that assumes of presentation of two different kinds of evidence to prove one's identity is called:
Select one:
Correct

Feedback

Question 26

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

The purpose of message signing is to assure confidentially of the message contents.
Select one:
Incorrect

Feedback

Question 27

Correct
Mark 1.00 out of 1.00
Flag question

Question text

To verify the sender by the recipient one is using:
Select one:
Correct

Feedback

Question 28

Correct
Mark 1.00 out of 1.00
Flag question

Question text

During this attack the victim is bombarded with SYN requests which consume enough resources to make the system unresponsive to legitimate users and services. This attack is called:
Select one:
Correct

Feedback

Question 29

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What functions does a typical firewall have?
(Three answers are correct)
Select one or more:
Correct
Correct
Correct

Feedback

Question 30

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Is the following sentence true or false?

The ESP (Encapsulation Security Payload) protocol is a member of IPSec suite. Its purpose is to guarantee payload's (message) integrity, data origin authentication of IP packets and confidentially of the payload.

It does provide protection for the entire packet, not only to the payload.
Select one:
Incorrect

Feedback

Question 31

Correct
Mark 1.00 out of 1.00
Flag question

Question text

A public key can be simply generated from a private key.

Select one:
Correct

Feedback

Question 32

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What is the difference between symmetric and asymmetric cryptographic algorithms?
Select one:
Correct

Feedback

Question 33

Correct
Mark 1.00 out of 1.00
Flag question

Question text

During a DoS attack one is gathering information about:
Select one:
Correct

Feedback

Question 34

Correct
Mark 1.00 out of 1.00
Flag question

Question text

 What does IPSec provide?
Select one or more:
Correct
Correct
Correct

Feedback

Question 35

Correct
Mark 1.00 out of 1.00
Flag question

Question text

It is a very bad habbit of administrators that they change their passwords frequently.

Select one:
Correct

Feedback

Question 36

Correct
Mark 1.00 out of 1.00
Flag question

Question text

A private key can be simply generated from a public key.

Select one:
Correct

Feedback

Question 37

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Confirmation for someone's identity is called:
Select one:
Correct

Feedback

Question 38

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What is the name of the following port scanning method?

A scanner initiates TCP handshaking (SYN) and hangs up (RST). Closed ports reply with the appropriate RST packet, whereas open ports reply with the SYN-ACK packet.
Select one:
Correct

Feedback

Question 39

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

In the initial phase of penetration tests (the reconnaissance) which of the following examination is not performed:
Select one or more:
Incorrect
Incorrect

Feedback

Question 40

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Explain the purpose of penetration tests
Select one:
Incorrect

Feedback