SCS: Laboratory Final Exam
Started onTuesday, 8 January 2013, 2:03 PM
StateFinished
Completed onTuesday, 8 January 2013, 2:47 PM
Time taken44 mins 20 secs
Grade20.40 out of a maximum of 40.00 (51%)
Feedback

The test is passed

Question 1

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

In this attack the offender is sending ICMP Echo Request  malformed packets with the spoofed source IP address set to the network broadcast address and the destination IP address pointing to the victim. This could lead to: 

-network bandwidth exhaustion (usually temporal),
-blockade of the victim's machine (which is flooded by ICMP Echo Reply).

This attack is called:
Select one:
Incorrect

Feedback

Question 2

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

This technique of defeating a cipher (or other security mechanism) to determine its decryption key or passphrase is using a set of likely possible words. This technique is called:
Select one:
Incorrect

Feedback

Question 3

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

In Virtual Private Networks concept, before virtual connection establishment, a client does not have to have physical (real) connection to the server.

Select one:
Incorrect

Feedback

Question 4

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

A payload protocol is also called:
Select one:
Incorrect

Feedback

Question 5

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

 What is the WHOIS tool used for?
Select one:
Incorrect

Feedback

Question 6

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

A private key can be simply generated from a public key.

Select one:
Incorrect

Feedback

Question 7

Correct
Mark 1.00 out of 1.00
Flag question

Question text

During a DoS attack one is gathering information about:
Select one:
Correct

Feedback

Question 8

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which DNS record stands for an alias of a domain?
Select one:
Correct

Feedback

Question 9

Correct
Mark 1.00 out of 1.00
Flag question

Question text

The purpose of message encrypting is to assure confidentially of the message sender, isn't it?
Select one:
Correct

Feedback

Question 10

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

To use remote resources in a safety way, you would suggest using:
Select one:
Incorrect

Feedback

Question 11

Partially correct
Mark 0.67 out of 1.00
Flag question

Question text

A network sniffer can:
Select one or more:
Correct
Correct

Feedback

Question 12

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

What is the difference between symmetric and asymmetric cryptographic algorithms?
Select one:
Incorrect

Feedback

Question 13

Partially correct
Mark 0.50 out of 1.00
Flag question

Question text

Explain what the NSLOOKUP tool enables?
Select one or more:
Correct

Feedback

Question 14

Correct
Mark 1.00 out of 1.00
Flag question

Question text

During this attack the victim is bombarded with SYN requests which consume enough resources to make the system unresponsive to legitimate users and services. This attack is called:
Select one:
Correct

Feedback

Question 15

Correct
Mark 1.00 out of 1.00
Flag question

Question text

An application which controls network traffic directed to and from a computer based on a predefined security policy is called personal firewall, ist't it?
Select one:
Correct

Feedback

Question 16

Partially correct
Mark 0.13 out of 1.00
Flag question

Question text

Which of the following scanning methods use TCP?
(Three answers are correct)
Select one or more:
Incorrect
Correct

Feedback

Question 17

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What kind of answer will a DNS server give if you ask it about a domain that does not lie in responsibility of this server?
Select one:
Correct

Feedback

Question 18

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Select proper types of firewall.
(Two answers are correct)
Select one or more:
Incorrect

Feedback

Question 19

Correct
Mark 1.00 out of 1.00
Flag question

Question text

The purpose of scanning (as a phase of penetration test) is to determine activity of certain computer by sending specially prepared packet to it and analyzing response from it (or lack of the response), isn't it?
Select one:
Correct

Feedback

Question 20

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Indicate the false sentence:
(Two answers are correct)
Select one or more:
Correct
Correct

Feedback

Question 21

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Is the following sentence true or false?

The ESP (Encapsulation Security Payload) protocol is a member of IPSec suite. Its purpose is to guarantee payload's (message) integrity, data origin authentication of IP packets and confidentially of the payload.

It does provide protection for the entire packet, not only to the payload.
Select one:
Incorrect

Feedback

Question 22

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Tunnels implemented using IPSec are unidirectional.

Select one:
Incorrect

Feedback

Question 23

Correct
Mark 1.00 out of 1.00
Flag question

Question text

This framework of open standards is used for ensuring private, secure communications over Internet Protocol (IP) networks, through the use of cryptographic security services. Its name is:
Select one:
Correct

Feedback

Question 24

Correct
Mark 1.00 out of 1.00
Flag question

Question text

The purpose of IPSec tunnel mode is to assure safe communication over network, isn't it?
Select one:
Correct

Feedback

Question 25

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Using pwdump you can simply known user's password.

Select one:
Correct

Feedback

Question 26

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Which of the following examination is performed in the second phase of penetration tests?
Select one:
Correct

Feedback

Question 27

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Indicate the true sentence:
Select one:
Incorrect

Feedback

Question 28

Correct
Mark 1.00 out of 1.00
Flag question

Question text

What is the other name of a secret key?
Select one:
Correct

Feedback

Question 29

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Indicate the false sentence:
(Two answers are correct)
Select one or more:
Correct
Correct

Feedback

Question 30

Partially correct
Mark 0.50 out of 1.00
Flag question

Question text

How can you check the routing table contents in MS Windows systems?
(Two answers are correct)
Select one or more:
Correct

Feedback

Question 31

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

Can Wireshark intercept and record network traffic?
Select one:
Incorrect

Feedback

Question 32

Correct
Mark 1.00 out of 1.00
Flag question

Question text

In the initial phase of penetration tests (the reconnaissance) which of the following examination is not performed:
Select one or more:
Correct

Feedback

Question 33

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Your personal firewall has the following active rule defined:

direction: outgoing,
protocol: tcp,
port: 21.
action: report.

You can normally download files using ftp. Is that true? 

Select one:
Correct

Feedback

Question 34

Correct
Mark 1.00 out of 1.00
Flag question

Question text

The authentication approach that assumes of presentation of two different kinds of evidence to prove one's identity is called:
Select one:
Correct

Feedback

Question 35

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

The purpose of Security Parameter Index is to:
Select one:
Incorrect

Feedback

Question 36

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

To assure confidentially of the message contents one should:
Select one:
Incorrect

Feedback

Question 37

Partially correct
Mark 0.60 out of 1.00
Flag question

Question text

How to resist DoS attacks?
Select one or more:
Correct
Correct
Correct

Feedback

Question 38

Correct
Mark 1.00 out of 1.00
Flag question

Question text

Indicate the false sentence:
(Two answers are correct)
Select one or more:
Correct
Correct

Feedback

Question 39

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

 

The following sentences are true or false?
Private key is stored on the sender's computer. The sender uses the key to digitally sign messages as well as decrypting (unlocking) messages from the recipients. This key should be password protected and should stay in secret.

Public key is given to the recipient. The recipient uses the key to verify the signature of the sender and to validate the integrity of the message as well as to encrypt (lock) messages sent to the sender. This key doesn't need to be password protected, neither needs to stay in secret.

 

Select one:
Incorrect

Feedback

Question 40

Incorrect
Mark 0.00 out of 1.00
Flag question

Question text

What functions does a typical firewall have?
(Three answers are correct)
Select one or more:
Incorrect
Correct

Feedback