AFCEH Exam Question and Answer
Google Language Translator
Web Based Proxy
Proxy Chains
Any two of the above
All of the above
Ans -5. All of the above
2.You receive a phone call on your cell phone from another Indian cell phone number.How can you trace the number?
There are tools available on the internet that will tell you the state in india where the cell phone is registered.
You can use Trace Route Tool.
You can install a firewall on your cell phone,which will record the IP adress of teh other cell phone.
It depends upon whether you have a post paid or pre paid connection.
It depends on how faar you are from a cell phone tower.
Ans -1. There are tools available on the internet that will tell you the state in india where the cell phone is registered.
3.What is the countermeasure to Brute Force Password Cracking?
Ensure that password is long.
Ensure that password has symbols.
Ensure that SSL encryption us used for Web application accessing the password.
Ensure that CAPTCHA is implemented.
Ensure that digital signature are using.
Ans -4. Ensure that CAPTCHA is implemented.
4.How can you steal files from a local machine when you don't know the Windows login password of that machine? Suggest a technique that will attract the least attention from the victim.
Password cracking tool.
Keylogger.
Data Sniffer.
Linux LIVE CD.
Serial Numbers.
Ans -4. Linux LIVE CD.
5.Let us assume you are communicating with two different people A and B.Both A and B on the same remote network.When you try to find out their IP address on your system,can they have the same IP address?
Yes
No.
Maybe
Only if they are using a proxy server.
Ans -1. Yes
6.How can an email server detect spoofed emails?
Reverse DNS lookup of the Sender's IP address.
Map Sender's IP address to domain.
Blacklist certain sender IP addresses.
Email header analysis.
Keyword based filtering.
Ans -2. Map Sender's IP address to domain.
7.What makes the Stacheldraht attack tool so difficult to counter?
It uses single key encryption.
It communicates using ICMP.
Its default port numbers can be changed.
It uses a very large number of simultaneous attackers.
All of the above.
Ans -5. All of the above.
8.What is HTTP tunneling?
A secure way of communication.
Working with any protocol transmitting it through http.
VPN
None of the above.
Ans -2. Working with any protocol transmitting it through http.
9.How to prevent infection by virus through Facebook?
When an unknown person adds you,do not accept request.
When an unknown person sends you a private message,do not open it.
When you are prompted to downlod something,do not accept it.
When you are to join a group,do not accept it.
When you are prompted to enter your personal details.
Ans -3. When you are prompted to download something,do not accept it.
10.Are switching networks vulnerable to sniffers?
No since only those data packets meant for a host reach the NIC.
Yes.
Don't know.
Depends upon the operating system.
I searched on Google but could not find the answer.
Ans -2. Yes
11.Whenever you create a new email account or social networking website account or any other online account,why are you asked to re-type some characters that are shown as an image on the website?
To fight piracy.
to fight viruses,worms and trojans.
To prevent users from creating multiple accounts.
To fight spammers and automatic scripts.
To ensure that the user can type properly.
Ans -4. To fight spammers and automatic scripts.
12.Decode DOCT to its plaintext format:
COAT
BOAT
DAFT
MEAT
SEAT
Ans -2. BOAT
13.While trying to change the signature of a Trojan you ended increasing few bytes in the hex file. What will be the result?
The Trojan file will crash altogether.
The Trojan will work and get undetected by the antivirus.
Addition of few bytes won't make much difference
Nothing will happen.It will ignore those bytes.
Ans -1. The Trojan file will crash altogether.
14.When you use the ipconfig command then your IP address is shown to be X,while when you visit www.whatismyip.com then your Ip address is shown to be Y.Which is your internal IP address and which is your external IP address?
X is Internal,Y is External.
Y is Internal,X is External.
Both are External.
Depends on whether proxy server is being used or not.
Depends on whether there is a firewall or not.
Ans -1. X is Internal,Y is External.
15.Convert ZEBDG into plaintext
Big Guy Dog Fun India
AFCEH
ANKIT
FADIA
YOURS
Ans -2. AFCEH
16.If you are the system administrator of a college and want to block use of peer to peer file sharing software,then what do you need to do?
Prevent use of cookies.
Block certain ports.
Block certain IP addresses.
Block certain protocols.
Block certain keywords.
Ans -2. Block certain ports.
17.What is most important from below for a sucessful Man in Middle attack?
Hijack one of the computers.
Data must pass through your computer.
Sniffed Session ID.
Sequence Number Prediction.
Time out should take place.
Ans -3. Sniffed Session ID.
18.What is a good countermeasure against Land attacks?
Patch your Operating System.
Disable all fake data packets.
Disable all ports.
Disable trust relationship based connections.
All of the above.
Ans -1. Patch your Operating System.
19.Which of the below is the most foolproof technique for regulating access to a file on a local system?
Password protected file.
Encrypted file.
Mounted Virtual Encrypted Drive.
USB Dongle.
Virtual Keyboard.
Ans -4. USB Dongle.
20.What is the main difference between Ophcrack and Offline NTPassword and Registry Editor?
Ophcrack is slow,Offline is fast
Ophcrack changes the password,Offline resets the password.
Ophcrack cracks the password,Offline resets the password.
Ophcrack resets the password,Offline cracks the password.
Ophcrack changes the password,Offline cracks the password
Ans -3. Ophcrack cracks the password,Offline resets the password.
21.Decode CNRJG to its plaintext format:
AFCEH
ANKIT
FADIA
APPLE
ALONE
Ans - 4. APPLE
22.How is connection terminated in TCP/IP?
A sends FIN/ACK to B.B sends a FIN/ACK to A.A sends an ACK to B.
A sends FIN to B.B sends a FIN/ACK to A.A sends an ACK to B.
A sends FIN to B.B sends a FIN to A.A sends an ACK to B.
A sends FIN to B.B sends an ACK to A.A sends an ACK to B.
A sends FIN/ACK to B.B sends an ACK to A.A sends an ACK to B.
Ans -2. A sends FIN to B.B sends a FIN/ACK to A.A sends an ACK to B.
23.Convert the following text Base64 into its equivalent Base64 Encoded text:
QmFzZTY0
QmFzZTY1
QmFzZTY2
QmFzZTY3
QmFzZTY5
Ans -1. QmFzZTY0
24.Why is it important to password protect the BIOS?
To prevent data theft.
To prevent passwords getting cracked.
To prevent systems settings from being changed
To prevent virus infection.
All of the above.
Ans -5. All of the above.
25.If you want to steal the data from a password protected computer,what is the best technique?
Brute Force.
InstallData Sniffer on another computer on same network.
War Driving.
Live CD.
Trojans.
Ans -4. Live CD.
26.How can you find whether the target computer is a Honeypot or not?
Nmap
ICMP Scanning
Ping Sweeping
Manual Hit & Trial
Honeypotscan.pl
Ans -4. Manual Hit & Trial
27.Usually when you port scan your home computer,you will find that some ports are open?Why?
There are daemons running on these open ports.
There are Trojans,spyware and keyloggers installed on these open ports.
The applications running o your system are using these open ports.
An attacker might be connecting to your system.
I don't know.
Ans -3. The applications running o your system are using these open ports.
28.How can you find out a remote computer's MAC address?
Windows Registry.
Netstat.
Data Sniffer.
Etherchange tool.
Ping.
Ans -3. Data Sniffer.
29.If your company or college is using software to monitor all your activities on your desktop computer,then what can you do to stop the monitoring?
Disable the Firewall
Disable the Sniffer.
Disable the Trojan.
Use Encryption.
HTTP Tunnelling
Ans -5. HTTP Tunnelling
30.In the CAPTCHA system,why are backgrounds of different colors?
To prevent Brute Force cracking.
To prevent spam.
To prevent spoofing.
To prevent sniffing tools.
To prevent OCR tools from working.
Ans -5. To prevent OCR tools from working.
31.You have Norton antivirus installed on your system. You scanned a trojan file and after altering the signature found that it is not being detected by Norton Now you send it to the victim where where it was caught by the antivirus what could be the possible explaination?
Your antivirus is not workng properly.
Your antivirus is not properly updated.
The victim is using some other antivirus.
There has been a binary editor in teh transit making teh fiel detectable again.
Ans -3. The victim is using some other antivirus.
32.Analyze the below email headers and determine the source IP address of the system that was used to send the email :
69.147.64.132
66.218.66.82
216.252.122.217
61.1.127.224
66.218.66.82
Ans -1. 69.147.64.132
33.Convert BGDFI into correct plaintext:
Big Guy Dog Fun India
AFCEH
ANKIT
FADIA
YOURS
Ans -2. AFCEH
34.What are persistent XSS attacks?
When the XSS attack continues for a long period of time.
When the XSS attack continues on multiple servers.
When the data entered by the attacker gets stored on the target and can be accessed later as well.
When the data by the attacker infects other computers on the same network
Ans -4. When the data by the attacker infects other computers on the same network.
35.If you want to prevent malicious attacks (that originate inside your network) from leaving your network,then what would you recommend?
Software based Firewall.
Hardware based Firewall.
Data Sniffer.
Reverse DNS Trace.
Proxy Server
Ans -1. Software based Firewall.
36.Imagine that you are working in an organization.You use Endora Pro to acess your email.If you are quitting you job nad want a copy of all your emails,then what is teh best thing to do?
Forward all emails to your personal account.
Copy and paste the tect from your email sto a word file.
Connect your personal computer to the mail server and download all emails to it.
Copy the Eudora Pro folder.
Copy the Systems folder.
Ans -4. Copy the Eudora Pro folder.
37.What is a good countermeasure to phishing?
Firewall
URL ANalysis
Hardware Device.
Awarness.
Digital Certificate of the page.
Ans -3. Hardware Device.
38.Whats is the correct way to use p0f when target system is www.abc.com?
Run p0f and the visit www.hotmail.com.
Run p0f and then trace route to www.abc.com.
Run p0f and then ping www.abc.com.
Visit www.abc.com and then run p0f.
Ping www.abc.xom and then run p0f.
Ans -3. Run p0f and then ping www.abc.com.
39.If you wish to commit a perfect a cyber crime,then which of the following would do?
Spoof your MAC address.
Connect to a proxy server.
Use an Internet Cafe.
All of the above.
Any two of the first three options.
Ans -4. All of the above.
40.A criminal sends you an email.You use email header analysis and traceroute to trace the IP address of the criminal.Which of the following statements is true?
The IP address is registered to the criminal.
The IP address is registered to the ISP of the criminal.
The IP address is registered to the company where the criminal works.
All of the above could be true.
Any two from the first three options could be true.
Ans -4. All of the above could be true.
41.How can you detect that a SYN Flood attack is taking place?
netstat
ipconfig
firewall
fport
Honeypot
Ans -1. netstat
42.Convert 101001101100100001 into plaintext form:
170785
240585
160685
121285
01018
Ans -1. 170785
43.If you have physical access to a Windows system which has a login password,then what is the fastest & most efficient way to steal data from the local hard drive?
Crack the Windows login password.
Do a security audit&hack into system from internal network.
Boot into Unix Live CD.
Use Biometric Cracks.
Steal HDD physically.
Ans -3. Boot into Unix Live CD.
44.How can you protect yourself against Clipboard theft while visiting websites?
Zone Alarm Firewall.
Update your browser.
Disable Scripting Languages.
Update Microsoft Windows.
Use a good Antivirus.
Ans -3. Disable Scripting Languages.
45.Why do you think array bound checking on input is an important aspect of secure programming?
Protects against Integer Overflows.
Protects against Format String Overflow.
Protects against Cross Site Scripting Attack.
Protects against SQL Injection.
Protects against piracy.
Ans -1. Protects against Integer Overflows.
46.For a website,what is the best way to protect their visitors from key loggers?
Antivirus Software.
Highest Browser Security Settings.
Antispyware software.
Secure Auditing.
Virtual Key-logger.
Ans -5. Virtual Key-logger.
47.When you telnet to the POP port on the target computer,which port you could be connecting to?
Port 110 or Port 25
Port 80 or Prot 1110
Port 8080 or Port 1234
One of the above.
All of the above.
Ans -5. All of the above.
48.How can you find the most visited websites on the network?
Untangle
Zone Alarm
www.anonymizer.com
Snort
Tripwire
Ans -1. Untangle
49.Which of the below is the most foolproof technique of detecting a cookie tracker?
Antivirus
PrevX
Tripwire
Mozilla
Firewall
Ans -3. Tripwire
50.When you port scan a target system,the port scanner shows that the ports:15,79,110,443 are open.What does that mean?
Port 15,79,110 and 443 are open.
Port 15,79,110 and 443 are closed.
Other ports could be open too.
Target system is running a Windows based platform.
Ans -3. Other ports could be open too.
2 comments:
nice blog,any master trick for SEO ??
working on that bro.. get here soon.. be touched with us and like us to get update on facebook
Post a Comment
This is Dofollow Blog.
Don't Spam us. Your comment should be relevant to contents(don't say simply thanks or very useful information, i'll consider this as spam).