Garantie de satisfaction à 100% Disponible immédiatement après paiement En ligne et en PDF Tu n'es attaché à rien
logo-home
Ethical Hacking Final Exam Questions and 100% Correct Answers €9,69   Ajouter au panier

Examen

Ethical Hacking Final Exam Questions and 100% Correct Answers

 1 vue  0 fois vendu
  • Cours
  • Ethical Hacking
  • Établissement
  • Ethical Hacking

Which part of the security triad is concerned about denial-of-service attacks Availability Which phase of the Hacking Methodology is the safest in regards to the target becoming aware that you are planning an attack against it? Reconnaissance with OSINT What type of hacker can be either ethical o...

[Montrer plus]

Aperçu 3 sur 16  pages

  • 24 septembre 2024
  • 16
  • 2024/2025
  • Examen
  • Questions et réponses
  • Ethical Hacking
  • Ethical Hacking
avatar-seller
Ethical Hacking Final Exam Questions
and 100% Correct Answers
Which part of the security triad is concerned about denial-of-service attacks
✅Availability

Which phase of the Hacking Methodology is the safest in regards to the target
becoming aware that you are planning an attack against it? ✅Reconnaissance with
OSINT

What type of hacker can be either ethical or unethical, usually dependent on the highest
bidder? ✅gray hat

What type of threat actor would hack a system to discover the names of doctors who
perform abortions and then release those names to the internet in an attempt to spread
anger and hatred among the anti-abortion population? ✅hacktivist

All systems on the internet are at risk from being attacked by hackers. Also, machines
not on the internet, such as air-gapped networks, are similarly at risk. ✅true

______________ exploits are mostly successful because they attack an
undiscovered/unknown vulnerability in a system, ✅zero-day

What is the fundamental difference between hacking and ethical hacking?
✅permissions to conduct the attack

If you secure information in its original form, which of the following are you protecting?
✅integrity

Which of the following is the first step in Ethical Hacking methodology? ✅none of these

A __________________ is someone who does not have the expertise of a hacker and
relies on ready-made tools as they can't write their own code. ✅script kitty

Nmap is considered an active form of reconnaissance. ✅true

The Whois website can be used to find domain and registrar information. ✅true

If theHarvester is provided with a domain name and ___________________, it can
return user information such as: email accounts, host names, and sub-domain names.
✅search engine name

,The command nslookup can query the domain name system. So, you can give it a
domain name and nslookup will return its ip address. ✅true

What tool was demonstrated that could graphically illustrate all of the technologies,
services, and subdomains for a given domain AND the connections between each?
✅Maltego

Using whois.domaintools.com would allow you to find the ip address of a domain.
✅true

Signing up for websites using your personal e-mail address can lead to identity theft
attacks. ✅true

Disabling all unnecessary ports and services is one action a system administrator can
take to harden the system he is overseeing. This is sometimes referred to as a
countermeasure. ✅true

A common and often successful attack vector for hackers is an employee who
unknowingly gives out sensitive information that can provide an entry point into the
system. ✅true

Nmap can provide many types of information such as the services and version number
of the service running on different ports, and what ports are open for connections.
However, it cannot fingerprint an Operating System, that is, determine what OS and
version the system is running. ✅false

What operating system is the popular choice of hackers (both ethical and unethical)
because it comes installed with all types of hacking tools? ✅Kali Linux

Nikto is useful for checking for vulnerabilities in ___________________. ✅Web
servers

Output from a nikto vulnerability scan can be output to html for easier reading and
facilitating research on the weaknesses found. ✅true

The OSVDB (open source vulnerability data base) is a currently maintained data base
that you could use to find the most recent vulnerabilities found in different systems and
ways to mitigate these. ✅false

MBSA is a free security analyzer that IT professionals can use to scan a microsoft-
based system for insecure configuration settings and offers guidance to correct these
insecurities. One of the mitigations demonstrated in class was making sure that
passwords must change periodically. Allowing someone the permission to never change
their password is a great find for hackers! ✅true

, A yellow exclamation point icon is used in a MBSA report to indicate that a critical check
has failed. ✅false

MBSA can generate professional-looking reports that you can present to a client
showing the results of your investigation of the client's system. ✅true

A false positive is a condition that is shown as a result when it does not actually exist.
✅true

The windows operating system is one component that MBSA checks to see if the most
recent updates to the OS have been installed. ✅true

Lynis is a free vulnerability scanning tool used with Windows systems but must be
installed first. ✅false

In social engineering, if an attacker gives fake reason(s) for obtaining sensitive
information (username, password, etc...) from a victim, this is known as
__________________. ✅Pretexting

Which of the following was not a method or technique presented for obtaining sensitive
information from a victim? ✅all can be used to obtain information

This type of phishing attack targets high-level executives of a company like a president,
CIO (chief information officer), CFO (chief financial officer), etc... ✅whaling

Kali Linux has a social engineering tookit called SET that provides an attacker with
various means of help in conducting a social engineering attack. ✅true

Using elicitation, the attacker extracts information from a victim without asking direct
questions. ✅true

What is the name of the browser add-on that can help protect users from phishing
schemes when browsing the web. ✅netcraft

What is the name of the website that contains a repository of phished Websites. You
can enter a URL, and it will provide details of whether it is phished or not. ✅Phishtank

In the lab on social engineering, you used Kali Linux to create a payload that would be
stored on a target machine. When the payload ran it connected back to a listener on the
attack machine. This is known as a Reverse TCP shell. The attackers machine would
then gain control of the session on the target machine and could potentially do all sorts
of nefarious things. In the lab, what service was run to transfer the payload to the target
machine? ✅ftp

Les avantages d'acheter des résumés chez Stuvia:

Qualité garantie par les avis des clients

Qualité garantie par les avis des clients

Les clients de Stuvia ont évalués plus de 700 000 résumés. C'est comme ça que vous savez que vous achetez les meilleurs documents.

L’achat facile et rapide

L’achat facile et rapide

Vous pouvez payer rapidement avec iDeal, carte de crédit ou Stuvia-crédit pour les résumés. Il n'y a pas d'adhésion nécessaire.

Focus sur l’essentiel

Focus sur l’essentiel

Vos camarades écrivent eux-mêmes les notes d’étude, c’est pourquoi les documents sont toujours fiables et à jour. Cela garantit que vous arrivez rapidement au coeur du matériel.

Foire aux questions

Qu'est-ce que j'obtiens en achetant ce document ?

Vous obtenez un PDF, disponible immédiatement après votre achat. Le document acheté est accessible à tout moment, n'importe où et indéfiniment via votre profil.

Garantie de remboursement : comment ça marche ?

Notre garantie de satisfaction garantit que vous trouverez toujours un document d'étude qui vous convient. Vous remplissez un formulaire et notre équipe du service client s'occupe du reste.

Auprès de qui est-ce que j'achète ce résumé ?

Stuvia est une place de marché. Alors, vous n'achetez donc pas ce document chez nous, mais auprès du vendeur twishfrancis. Stuvia facilite les paiements au vendeur.

Est-ce que j'aurai un abonnement?

Non, vous n'achetez ce résumé que pour €9,69. Vous n'êtes lié à rien après votre achat.

Peut-on faire confiance à Stuvia ?

4.6 étoiles sur Google & Trustpilot (+1000 avis)

81113 résumés ont été vendus ces 30 derniers jours

Fondée en 2010, la référence pour acheter des résumés depuis déjà 14 ans

Commencez à vendre!
€9,69
  • (0)
  Ajouter