JSPM's Jayawantrao Sawant Polytechnic, Handewadi Road, Hadapsar, Pune-28 Department of Computer Engineering Academic Year 2021-22

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

JSPM’s

JAYAWANTRAO SAWANT POLYTECHNIC, Handewadi Road,


Hadapsar, Pune-28

Department of Computer Engineering

Academic Year 2021-22

Class Test- 6

Course: ETI Course Code: 22618


Course & Code: CO6I Class: TYCO
Semester: Sixth Name of the Faculty: MS.N.S. Bahirame
Date:

CO 6: Detect Network, Operating System, and application vulnerabilities


CHAPTER 6: Types of Hacking
1) A ________ can setup backdoor access into your network
a) hacker b) attacker c) system d) none of the above
2) _________ provide the basic view of how the network is laid out
a) host b) port scanner c) application d) Operating system
3) The port scanner sends _______ request to the host or range of host u set it to scan
a) TCP SYN b) PORT SYN c) HOST SYN d) none of the above
4)Wireless Vulnerabilities are in implementation of the _____ standard
a) 802.11 b) 802.1 c) 802.13 d) none of the above
5) SNMP stands for
a. Simple Network Messaging Protocol b. Simple Network Mailing Protocol
c. Simple Network Management Protocol d. Simple Network Master Protocol

6) ________ for gathering NetBIOS name table information


a) nbtstat b) netstat c) net d) none of the above
7) Banner grabbing is often used for
a. White Hat Hacking b. Black Hat Hacking c. Gray Hat Hacking d. Script Kiddies
8) Which of the following is a tool for performing footprinting undetected?
a) Whois search b)Traceroute c)Ping sweep d)Host scanning
9) What is the first phase of hacking?
a) Attack b) Maintaining access c)Gaining access d)Reconnaissance e)Scanning
10) Hacking for a cause is called __________________.
a) Active hacking b) Hacktivism c) Activism d) Black-hat hacking

Course Teacher HOD

You might also like