Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Please help me answer the following questions - 1. Which of these is Penteration

ID: 3903158 • Letter: P

Question

Please help me answer the following questions -

1. Which of these is Penteration testing methadology?

(a) White box model

(b) Black box model

(c) Gray box model

(d) all of the above

2. Which of these skills are needed by security tester

(a) Knowldege of network and computer technology

(b) Ability to communicate with management and IT personnelle

(c) An understanding of the laws in your location and ability to use necessary tools

(d) all of the above

3. Which of the following are district layers of TCP/IP?

(a) Network and Internet

(b) Transport and Application

(c) Network, Internet, Transport, Presentation

(d) A and B

4. Which of the followings are the TCP segment flags?

(a) SYN flag: synch flag , ACK flag: acknowledgment flag

(b) SYN flag: synch flag , ACK flag: acknowledgment flag

(c)PSH flag: push flag, URG flag: urgent flag, RST flag: reset flag, FIN flag: finish flag

(d)A and C

5. Which of the following are properties of User Datagram Protocol (UDP)?

(a)Fast but unreliable delivery protocol and Operates on Transport layer

(b) Fast but unreliable delivery protocol and Operates on Transport layer

(c)Depends on higher layers of TCP/IP stack handle problems and Referred to as a connectionless protocol

(d)All of the above

Explanation / Answer

Solution:

1) Option (d) – All the above

Explanation:

White box model: In white box testing, the tester got full access and must have in depth knowledge of the system which is needed to be tested. This is really helpful in carrying out the extensive penetration testing.

Black Box model: In this model, very high-level information is provided to the tester. Here the tester has no information of the system.

Grey Box model: In this model, only limited information is provided to the tester to test the system externally.

2) Option (a) – knowledge on network and computer technology

Explanation: -

The tester must have knowledge on networking and computer technology. The tester must have idea on OSI layer model and have a good understanding on OS concepts. Moreover, the professional should have clear knowledge on DHCP and DNS.

3) Option (d) – A and B

Explanation: - Application Layer: - it is the top most layer of all the 4 layers of TCP/IP protocol. It defines all the protocols required to run the application. Example: HTTP, DHCP, etc

Transport Layer: - Transport layer is the second topmost layer of the model. It usually permits devices on source as well as destination to carry the data. Example: TCP, UDP

Internet: - Internet Layer is another vital layer of TCP/IP model. Here data is transmitted in the form of packets from source to destination devices. This layer is responsible for IP datagrams routing. Example: - IP, ICMP, ARP.

Network: - this is the bottom most layer of the model. It actually tells how data is transmitted in physical layer. Data is transmitted in the form of bits through network cables. Example: - Ethernet, FDDI

4) Option (d) – A and C

Synchronization Flag: -The synchronization flag is well known in TCP communication. This flag is initially sent while establishing a 3 – way handshake between two devices.

Acknowledgement Flag: - the function of this flag is to acknowledge the successfully receiving of the packets.

Push Flag: - This flag ensures that the data must be given the exact priority it deserves and must be processed at any of sending or receiving end.

Urgent Flag: - The Urgent flag usually identifies the incoming data and marked it as urgent. The data don’t have to wait for other segments to reach.

Reset Flag: - This flag is used when the segment arrives is not needed. That time the host send you a reply and set the RESET flag.

Finish Flag: - this flag is used to end the connection using the synchronization flag. This flag generates during the transmission of the last flag.

5) Option (d) – All the above

UDP is the User Datagram Protocol. It is generally a connectionless protocol and it is faster as compared to TCP. But UDP is less reliable because the receiver doesn’t send any acknowledgement regarding the packet received. So, the source doesn’t have any idea whether the packet has successfully reached the receiver and sender keeps on sending the data. For that reason, it is unreliable.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote