Ethical Hacking | Week 9

Ethical Hacking Week 9 Assignment Answers

Course Link:

Q1. Which of the following statement(s) is/are true for sniffing?
a. Itis a process of analyzing network activity by capturing network traffic.
b. Itis a process of finding the vulnerability in a network.
c. Itis a process used for user enumeration.
d. None of these.

Q2. Consider the following statements.
(i) Burp suite is a popular tool used for sniffing.
(ii) Using Burp suite we can perform password attack on web applications.

a. Only (i) is true.
b. Only (ii) is true.
c. Both (i) and (ii) are true.
d. Both (i) and (ii) are false.

Q3. What is the purpose of repeater module available in burp suite?
a. Itis used to mount password attack.
b. Itis used for manipulating and reissuing packets and to analyze their response.
c. Itis used for creating dictionary.
d. None of these.

Q4. Which of the following approach(es) cannot protect against sniffing?
a. Restrict physical access to the network media.
b. Permanently add the MAC address of gateway to ARP cache.
c. Use encryption to protect confidential information.
d. Use dynamic IP address and ARP entries.
e. None of these.

Q5. Which of the following is/are example(s) of human-based social engineering attack?
a. Impersonation
b. Piggybacking
c. Shoulder surfing
d. Pop-up windows
e. Chain letters
f. phishing

Q6. Which of the following tools can be used for social engineering attack?
a. Dnsenum
b. Hydra
c. Crunch
d. SEToolkit
e. Arpspoof

Q7. Which of the following protocols is/are not vulnerable to sniffing attack?
b. Telnet
c. SSH
d. SSL

Q8. Which of the following can be used as a countermeasure for DoS/DDoS attack?
a. Replicate servers to provide additional failsafe protection.
b. Increase bandwidth on critical connections.

c. Secure the infrastructure using approaches such as anti-spam, content filtering, anti-trojan, firewalls, and load balancing.
d. Shut down all services until the attack has subsided.
e. None of this.

Q9. Which of the following tool/approach cannot be used to perform DoS attack?
a. Hping3 tool
b. “http-slowloris” nmap script
c. LOIC tool
d. Hydra and Crunch.

Q10. For mounting DoS attack using hping3 tool how many packets will be send per second if we use –faster option?
a. 10
b. 100
c. 1000
d. 10000

* The material and content uploaded on this website are for general information and reference purposes only and don’t copy the answers of this website to any other domain without any permission or else copyright abuse will be in action.

Please do it by your own first! Protection Status

0 0 votes
Article Rating
Notify of

Inline Feedbacks
View all comments
close button
Would love your thoughts, please comment.x