Ethical Hacker Pro Test Questions and Correct Answers
1 view 0 purchase
Course
Ethical Hacking
Institution
Ethical Hacking
Ethical hacking Perpetrating exploits against a system with the intent to find vulnerabilities so that security weaknesses can be addressed and the system can be made more secure.
Penetration testing The practice of finding vulnerabilities and risks with the purpose of securing the computer or net...
Ethical Hacking Study Guide with
Questions and Correct Answers
Which of the following is not a step of the attack lifecycle? ✅External Recon
Which of the following is a collection of software tools that gives a
threat actor remote access to and control over a computer or other system? ✅Rootkit
In ethical hacking, is the process of identifying information about the target before
attacking. ✅reconnaissance
Which of the following hackers refers to people who always do their work for good?
✅White-hat
Which of the following ethical hacking stages installs any access mechanism to persist
on a system? ✅Maintaining access
Which type of hacking involves looking for vulnerabilities in a computer or network
system to test a target and ultimately fix them? ✅Ethical
Which teaming is the practice of rigorously challenging plans, policies, systems, and
assumptions by adopting an adversarial approach? ✅Red
Which method identifies the size and scope of the target network? ✅Footprinting
Who among the following hackers are engaged in potentially illegal activities, such as
attacking computer systems for malicious purposes? ✅Black-hat
Which of the following phases of the cyber kill chain model allows the outside server to
communicate with the weapons providing "hands-on keyboard access" inside the
target's network? ✅Command and control
is most important when you embark on an engagement, regardless of
whether you are working on a contract or are a full-time employee. ✅Communication
Which of the following is an act of locating weaknesses and vulnerabilities of
information systems by copying the intent and actions of malicious hackers?
✅Penetration testing
servers are used by attackers to send commands to malware residing on
endpoints. ✅C2
, What is the main purpose of the Rain Forest Puppy Policy (RFP or RFPolicy)?
✅Ensures that the vendors had time to fix issues before announcing them
What do you mean by establishing footholds in the attack lifecycle? ✅Ensuring that the
attackers retain access to the system so they can get back in when they need to
If you were looking for definitive documentation on a protocol, what would you consult?
✅RFC
If you wanted a lightweight protocol to send real-time data over, which of these would
you use? ✅UDP
The protocol data unit (PDU) for the Transmission Control Protocol (TCP) is called a
✅segment
Which of the following refers to a large computer with specialized interfaces acting as
message gateway? ✅IMP
Which of these protocols would be used to communicate with an loT device? ✅HTTP
If you were to see the subnet mask 255.254.0.0, which CIDR notation (prefix) would you
use to indicate the same thing? ✅/15
Which of the following cloud -based service models offers customers a platform on
which they can develop, run, and manage their applications and services? ✅PaaS
Which of these services would be considered as a 'storage as a service" solution?
✅iCloud
The UDP headers contain which of the following fields? ✅Destination port, source port,
checksum, and length
Which network topology are you most likely to run across in a large enterprise network?
✅Star-bus hybrid
Which protocol is necessary to enable the functionality of traceroute? ✅ICMP
Which of the following IP header fields indicates how long a message can live on the
network before it is considered to be expired? ✅TTL
The common format of a MAC address is 6 octets (3-bit bytes) generally separated by
✅colons
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller twishfrancis. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $8.49. You're not tied to anything after your purchase.