Capgemini Tech Challenge Coding Questions And Answers | Capgemini Coding Contest Questions
In this article Capgemini Tech Challenge Coding Questions And Answers you will get all the sample and frequently asked questions, which will help you in attending Capgemini Exam.
If you still have not Registered to Capgemini Off Campus Tech Challenge 2020 check this Link here
Capgemini Coding Contest Questions of Penetration Testing
weaknesses.
A. Vulnerability Exploit
B. Vulnerability Analysis
C. Vulnerability assessment
D. Vulnerability scan
A. can evaluate the security of system or network
B. cannot be used to identify the vulnerabilities left undetected by automated vulnerability
scanners
C. is an unauthorized attempt to exploit a computer system
D. determines the critical vulnerabilities
vulnerabilities, and can find new vulnerabilities.
A. True
B. False
Explanation:
Nexpose, Nessus and GFI are tools that try to match conditions found on the target system with known vulnerabilities, but they
lack the ability to find new vulnerabilities. These tools count on a database to identify the existence of certain weaknesses.
A. True
B. False
Explanation:
The last phase, or vulnerability assessment, tries to verify the vulnerabilities found and is done with little or no user interaction.
A. less planning
B. a schedule
C. an attack design
D. automated tools
Explanation:
A skilled manual tester will always plan and schedule everything in advance. An experienced pen tester will always prepare an
attack design and schedule it.
A. Faster
B. Computerized
C. Accurate
D. In-depth coverage
Explanation:
The testing carried out with automated tools is faster when compared to manual ones. Automated tools are fully computerized,
whereas manual testing depends entirely on the skill of the tester.
A. Fast
B. Dependency on the vendor’s database
C. Only tests technical flow
D. Computerized
Explanation:
Automated tools work based on the information provided in the database, and the decreased chances of being updated to the
latest threats affects the efficiency of the test. The automated testing only tests the technical flow, whereas the manual testing
tests for both technical and business/logic flow.
A. Awareness to new attack vendors
B. Tests for both technical and business/logic flow
C. Does not cover the entire system
D. Slow
Explanation:
Only automated testing is able to cover every bit of the system, whereas the manual testing fails to do so. The manual testing is
slow when compared to automated testing.
A. Dependency on the skill of the tester
B. Accuracy
C. Possibility of forgetting
D. Familiarity with new threats
Explanation:
The automated tools lack accuracy. The automated tools depend on the database of the vendor, which may not be updated.
A. Code review
B. Vulnerability scan
C. Manual testing
d. Dynamic Testing
Explanation:
Code review can be used to identify the vulnerabilities left by developers, thereby protecting the possibility of data leakage and
adding another layer of security.
A. regedit.exe
B. gpedit.msc
C. wf.exe
D. cmd
A. crontab
B. ls -l
C. lsof
D. dir
A. True
B. False
A. iptables -L
B. iptables -F
C. iptables – A
D. None of the above.
A. 555
B. 666
C. 777
D. 077
A. /var
B. /bin
C. /etc
D. /lib
A. Application Layer
B. Session Layer
C. Transport Layer
D. Internetwork layer
A. FTP
B. SMTP
C. HTTPS
D. DHCP
A. DHCP
B. DNS
C. ARP
D. UDP
A. ACK
B. RST
C. PSH
D. FIN
A. MAC Address
B. IP Address
D. Protocol
D. All of the above
A. Router
B. Switch
C. Intrusion Detection System
D. All of the above
A. Pipe
B. Function
C. Cmdlet
D. ISE
A. Yes
B. No
A. White hat hackers
B. Gray hat hackers
C. Script-kiddies
D. Suicide hackers
0 Comments