Which of the following is a tool for performing footprinting undetected? A.Whois search B.Traceroute C.Ping sweep D.Host scanning ANSWER: A What is the next step to be performed after footprinting? A.Scanning B.Enumeration C.System hacking D.Active information gathering ANSWER: A Which are good sources of information about a company or its employees? (Choose all that apply.) A.Newsgroups B.job postings C.Company website D.Press releases E.All of the mentioned ANSWER: E What is footprinting? A.Measuring the shoe size of an ethical hacker B.Accumulation of data by gathering information on a target C.Scanning a target network to detect operating system types D.Mapping the physical layout of a target’s network ANSWER: B What are the three types of scanning? A.Port, network, and vulnerability B.Port, network, and services C.Grey, black, and white hat D.Server, client, and network ANSWER: A What is the proper sequence of a TCP connection? A.SYN-SYN ACK-ACK B.SYN-ACK-FIN C.SYN-SYNACK-ACK D.SYN-PSH-ACK ANSWER: A -------- is a message that has to be transmitted into ciphertext. A.hash B.ciphertext C.key D.plaintext ANSWER: D In a database where he encryption is applied the data is can not be handled by the user without A.Encryption key B.Decryption key C.Primry Key D.Authorised key ANSWER: B In public key cryptosystem which is kept as public A.Encryption keys B.Decryption keys C.Encryption and Decryption keys D.None of the mentioned. ANSWER: A Today Private key algorithm is used for ------- and public key algorithm is used for ------ A.Messages, session key B.Session key, messages C.Can be used for both D.None of the mentioned. ANSWER: A Which has a key length of 128bits A.DES B.IDEA & Triple-DES C.Triple DES D.None of the mentioned ANSWER: D A Cryptographic hash function has variable output length A.True B.False ANSWER: B Data compression can be done using A.AES Algorithm B.DES Algorithm C.MD5 Algorithm D.RSA ALgorithm ANSWER: C Acknowledgement is needed in -------- scanning A.XMAS B.FULL SCAN C.FIN SCAN D.Stealth SCAN E.ALL of the mentioned ANSWER: B In RSA algorithm, after encryption if the public key is hacked, then the ciphertext will be compromised. A.False B.True ANSWER: B