> Capgemini Tech Challenge Coding Questions And Answers | Capgemini Coding Contest Questions

Capgemini Tech Challenge Coding Questions And Answers | Capgemini Coding Contest Questions

 


Capgemini Tech Challenge Coding Questions And Answers | Capgemini Coding Contest Questions


In this article Capgemini Tech Challenge Coding Questions And Answers you will get all the sample and frequently asked questions, which will help you in attending Capgemini Exam.

If you still have not Registered to Capgemini Off Campus Tech Challenge 2020 check this Link here

Capgemini Coding Contest Questions of Penetration Testing

1. Which stage does not verify or try to exploit the vulnerability, just lists and ranks the identified
weaknesses.

A. Vulnerability Exploit
B. Vulnerability Analysis
C. Vulnerability assessment
D. Vulnerability scan

2. Penetration testing


A. can evaluate the security of system or network
B. cannot be used to identify the vulnerabilities left undetected by automated vulnerability
scanners
C. is an unauthorized attempt to exploit a computer system
D. determines the critical vulnerabilities

3. Nexpose and GFI are tools that try to match conditions found on the target system with known
vulnerabilities, and can find new vulnerabilities.


A. True
B. False

Explanation:
Nexpose, Nessus and GFI are tools that try to match conditions found on the target system with known vulnerabilities, but they
lack the ability to find new vulnerabilities. These tools count on a database to identify the existence of certain weaknesses.

4. A vulnerability scan tries to verify the vulnerabilities found with little or no user interaction.


A. True
B. False

Explanation:
The last phase, or vulnerability assessment, tries to verify the vulnerabilities found and is done with little or no user interaction.

5. Manual testing requires:


A. less planning
B. a schedule
C. an attack design
D. automated tools

Explanation:
A skilled manual tester will always plan and schedule everything in advance. An experienced pen tester will always prepare an
attack design and schedule it.

6. Identify the benefits of using automated tools.


A. Faster
B. Computerized

C. Accurate
D. In-depth coverage

Explanation:
The testing carried out with automated tools is faster when compared to manual ones. Automated tools are fully computerized,
whereas manual testing depends entirely on the skill of the tester.

7. Identify the disadvantages of using automated tools.


A. Fast
B. Dependency on the vendor’s database
C. Only tests technical flow
D. Computerized

Explanation:
Automated tools work based on the information provided in the database, and the decreased chances of being updated to the
latest threats affects the efficiency of the test. The automated testing only tests the technical flow, whereas the manual testing
tests for both technical and business/logic flow.

8. What are the disadvantages of manual testing?


A. Awareness to new attack vendors
B. Tests for both technical and business/logic flow
C. Does not cover the entire system
D. Slow


Explanation:
Only automated testing is able to cover every bit of the system, whereas the manual testing fails to do so. The manual testing is
slow when compared to automated testing.

9. Pick out the merits of manual testing.

A. Dependency on the skill of the tester
B. Accuracy
C. Possibility of forgetting
D. Familiarity with new threats

Explanation:
The automated tools lack accuracy. The automated tools depend on the database of the vendor, which may not be updated.

10. Pen testers will use _____ to protect the possibility of data leakage and add another layer of security.


A. Code review
B. Vulnerability scan
C. Manual testing
d. Dynamic Testing

Explanation:
Code review can be used to identify the vulnerabilities left by developers, thereby protecting the possibility of data leakage and
adding another layer of security.

11. Which of the following commands is used to view and edit Windows Security Policies?

A. regedit.exe
B. gpedit.msc
C. wf.exe
D. cmd

12. Which of the following Linux commands is used to check files opened by current user?


A. crontab
B. ls -l
C. lsof
D. dir

13. An application running at Ring 2 has higher privileges than an application running at Ring 0. True or False?


A. True
B. False

14. Which of the following Linux commands is used to clear all the current iptables rules?


A. iptables -L
B. iptables -F
C. iptables – A
D. None of the above.

15. Which of the following value denotes full access (read/write/execute) to all users and groups?


A. 555
B. 666
C. 777
D. 077

16. Which of the following directories in Linux stores all configuration files?


A. /var
B. /bin
C. /etc
D. /lib

17. Which of the following is not a layer of the TCP/IP protocol?


A. Application Layer
B. Session Layer
C. Transport Layer
D. Internetwork layer

18. Port number 443 is used by which of the following?


A. FTP
B. SMTP
C. HTTPS
D. DHCP

19. Which of the following protocols is used for translating IP addresses to MAC addresses?


A. DHCP
B. DNS
C. ARP
D. UDP

20. Which of the following TCP flags is used for closing a connection?


A. ACK
B. RST
C. PSH
D. FIN

21. A DHCP server is responsible for providing which of the following to its client?


A. MAC Address
B. IP Address
D. Protocol
D. All of the above

22. Which of the following helps detect malicious attacks over a network using the signature matching technique?


A. Router
B. Switch
C. Intrusion Detection System
D. All of the above

23. Which of the following is a lightweight script used to perform a single function in PowerShell?


A. Pipe
B. Function
C. Cmdlet
D. ISE

24. Is PS C:\Admin\user> ls | a valid Windows PowerShell statement?


A. Yes
B. No

25. Which of the following are mainly unskilled and novice hackers who use tools and scripts developed by others to hack into systems?

A. White hat hackers
B. Gray hat hackers
C. Script-kiddies
D. Suicide hackers

Post a Comment

0 Comments