Unit 4 - Practice Quiz

INT244

1 What is the primary function of a packet sniffer in a network environment?

A. To encrypt network traffic
B. To capture and analyze network traffic
C. To block unauthorized access
D. To flood the network with data

2 In which mode must a Network Interface Card (NIC) be configured to capture all packets on a network segment, regardless of the destination MAC address?

A. Protected Mode
B. Promiscuous Mode
C. Private Mode
D. Safe Mode

3 Which of the following best describes 'Passive Sniffing'?

A. Sniffing on a switched network by injecting packets
B. Sniffing on a hub-based network without altering traffic
C. Overloading the switch's CAM table
D. Using ARP poisoning to redirect traffic

4 Why is sniffing on a switched network more difficult than on a hub-based network?

A. Switches encrypt all data by default
B. Switches only forward packets to the specific destination port
C. Switches do not support Promiscuous mode
D. Switches have built-in firewalls

5 What attack technique involves flooding a switch with numerous fake MAC addresses to fill up its CAM table?

A. ARP Poisoning
B. MAC Flooding
C. DHCP Starvation
D. DNS Spoofing

6 What is the result when a switch enters 'fail-open' mode due to a MAC flooding attack?

A. It shuts down all ports
B. It acts like a hub and broadcasts all traffic
C. It blocks all UDP traffic
D. It disconnects the attacker

7 Which protocol is abused during an ARP Poisoning attack?

A. Address Resolution Protocol
B. Advanced Routing Protocol
C. Automatic Retrieval Protocol
D. Authenticated Resolution Protocol

8 ARP Poisoning is commonly used to facilitate which type of attack?

A. SQL Injection
B. Man-in-the-Middle (MitM)
C. Buffer Overflow
D. Cross-Site Scripting

9 What is MAC Spoofing?

A. Physically replacing a network card
B. Flooding the network with MAC addresses
C. Changing the factory-assigned MAC address of a NIC in software
D. Stealing a user's password via email

10 Which switch feature allows an administrator to copy traffic from one port to another for analysis?

A. Port Security
B. VLAN Tagging
C. SPAN (Switched Port Analyzer)
D. Spanning Tree Protocol

11 What is the primary difference between a SPAN port and a hardware network tap?

A. A tap is software-based; SPAN is hardware-based
B. A tap is a physical device inserted into the cable; SPAN is a switch configuration
C. SPAN is undetectable; taps are easily detected
D. Taps drop packets; SPAN guarantees 100% capture

12 Which tool is commonly associated with performing MAC flooding attacks?

A. Wireshark
B. macof
C. Nmap
D. Nessus

13 How can an administrator detect a NIC running in promiscuous mode using DNS?

A. The NIC will not respond to DNS queries
B. The NIC performs reverse DNS lookups for every IP it sniffs
C. The NIC blocks port 53
D. The NIC sends broadcast DNS requests only

14 Which method involves measuring the response time of a host to detect if it is sniffing?

A. ARP Method
B. Latency/Ping Method
C. DNS Method
D. Etherflood Method

15 Which of the following is the most effective defense against packet sniffing?

A. Using static IP addresses
B. Using encryption (e.g., SSH, SSL/TLS)
C. Hiding the SSID
D. Using a complex password

16 What is Social Engineering in the context of information security?

A. Hacking into social media servers
B. Manipulating people into divulging confidential information
C. Creating social networks for hackers
D. Engineering secure social platforms

17 Which is the first phase of a social engineering attack?

A. Select Victim
B. Research/Reconnaissance
C. Develop Relationship
D. Exploit

18 In the context of social engineering phases, what is 'Pretexting' often part of?

A. The cleanup phase
B. The research phase
C. The hook/trust development phase
D. The hardware installation phase

19 Which social engineering threat involves sending fraudulent emails appearing to be from reputable sources?

A. Vishing
B. Phishing
C. Tailgating
D. Dumpster Diving

20 What is 'Vishing'?

A. Video Phishing
B. Voice/VoIP Phishing
C. Virtual Phishing
D. Visual Phishing

21 What is 'Smishing'?

A. Phishing via SMS/Text messages
B. Small Phishing attacks
C. Smart Phishing
D. Social Media Phishing

22 Looking over someone's shoulder to get information such as PINs or passwords is known as:

A. Eavesdropping
B. Shoulder Surfing
C. Piggybacking
D. Screen Scraping

23 Searching through trash to find sensitive information like bills or notes is called:

A. Recycling
B. Dumpster Diving
C. Waste Management
D. Garbage Spoofing

24 An attacker waits for an authorized person to open a secure door and then follows them inside. This is called:

A. Tailgating/Piggybacking
B. Fence Jumping
C. Lock Picking
D. Door Jamming

25 Which attack involves leaving infected physical media (like a USB drive) in a public place hoping someone plugs it in?

A. Phishing
B. Baiting
C. Spamming
D. Skimming

26 What is 'Quid Pro Quo' in social engineering?

A. Stealing an ID card
B. Promising a benefit in exchange for information
C. Threatening a victim
D. Using a fake website

27 Identity theft primarily involves:

A. Stealing a physical laptop
B. Deleting a user's files
C. Impersonating someone using their personal information
D. Crashing a server

28 What is the primary goal of a Denial of Service (DoS) attack?

A. To steal data
B. To compromise data integrity
C. To disrupt the availability of a service
D. To gain administrative access

29 What distinguishes a DDoS attack from a standard DoS attack?

A. DDoS uses a single attacker
B. DDoS uses multiple compromised systems (botnet)
C. DDoS is only done via email
D. DDoS targets databases only

30 In a DDoS architecture, what is a 'Zombie'?

A. The target server
B. The attacker's computer
C. A compromised computer controlled by the attacker
D. The firewall

31 Which attack exploits the TCP three-way handshake by sending many connection requests but never completing them?

A. Ping of Death
B. SYN Flood
C. UDP Flood
D. HTTP GET Flood

32 What is a 'Smurf Attack'?

A. Sending oversized ICMP packets
B. Using spoofed broadcast pings to flood a target
C. Sending malware via email
D. Crashing a database with SQL queries

33 Which of the following is an example of a Permanent Denial of Service (PDoS) attack?

A. SYN Flooding
B. Phlashing
C. Teardrop Attack
D. Session Hijacking

34 What type of DoS attack targets the application layer (Layer 7)?

A. UDP Flood
B. HTTP Flood
C. SYN Flood
D. Smurf Attack

35 Which tool, known as the 'Low Orbit Ion Cannon', is a popular open-source network stress testing and DoS tool?

A. LOIC
B. Nmap
C. Metasploit
D. Netcat

36 What is the function of a Command and Control (C&C) server in a DDoS attack?

A. To filter traffic
B. To send instructions to the botnet
C. To host the victim website
D. To generate logs

37 Which DoS tool is designed to keep many connections to the target web server open and hold them as long as possible?

A. Slowloris
B. Wireshark
C. John the Ripper
D. Ping

38 What is a 'Teardrop' attack?

A. Sending fragmented packets that cannot be reassembled
B. Flooding with tear-shaped emojis
C. Sending packets with future timestamps
D. Disconnecting the power cable

39 Hping3 is a command-line oriented TCP/IP packet assembler/analyzer that can be used for:

A. Only passive sniffing
B. Generating specific packet floods for DoS
C. Repairing corrupted files
D. Social engineering

40 What is a 'Reflection Attack'?

A. Mirroring the victim's website
B. Spoofing the victim's IP and sending requests to third-party servers
C. Reflecting laser signals
D. Hacking the internal router

41 Which of the following is a critical consideration when performing a DoS Pen-Test?

A. Ensure the attack is done without permission
B. Coordinate with the ISP and cloud provider
C. Use the most destructive malware available
D. Target the personal devices of employees

42 What is 'Blackholing' or 'Sinkholing' in the context of DDoS mitigation?

A. Deleting the attacker's computer
B. Redirecting malicious traffic to a non-existent endpoint
C. Shutting down the internet
D. Hacking back the attacker

43 Which UDP-based amplification attack uses Network Time Protocol servers?

A. HTTP Flood
B. NTP Amplification
C. SYN Flood
D. Slowloris

44 What is the concept of 'Reverse Social Engineering'?

A. The victim attacks the social engineer
B. The attacker creates a problem and convinces the victim to contact them for help
C. Ignoring social engineering attempts
D. Using software to block social media

45 Which tool is an advanced version of LOIC that supports HTTP floods and customization?

A. HOIC (High Orbit Ion Cannon)
B. Ping
C. Traceroute
D. Netstat

46 What does a packet sniffer capture when a network uses unencrypted Telnet?

A. Only the headers
B. Garbage characters
C. Plaintext usernames and passwords
D. Encrypted hashes

47 In a Man-in-the-Middle attack enabled by ARP poisoning, the attacker acts as:

A. A firewall
B. A relay between the victim and the gateway
C. A DNS server
D. A database administrator

48 Which of the following describes 'Impersonation' in social engineering?

A. Pretending to be a legitimate user or authority figure
B. Installing a virus
C. Cracking a password
D. Scanning ports

49 What is the 'Ping of Death'?

A. A ping that destroys the hardware
B. Sending an ICMP packet larger than the maximum IP packet size (65,535 bytes)
C. Pinging a server every second
D. A ping that carries a virus

50 Which countermeasure helps prevent ARP Poisoning on a switch?

A. Dynamic ARP Inspection (DAI)
B. Disabling all ports
C. Using Hubs instead of Switches
D. Turning off the power