100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Ethical Hacking Final Exam Questions and 100% Correct Answers $9.99   Add to cart

Exam (elaborations)

Ethical Hacking Final Exam Questions and 100% Correct Answers

 1 view  0 purchase
  • Course
  • Ethical Hacking
  • Institution
  • Ethical Hacking

Which part of the security triad is concerned about denial-of-service attacks Availability Which phase of the Hacking Methodology is the safest in regards to the target becoming aware that you are planning an attack against it? Reconnaissance with OSINT What type of hacker can be either ethical o...

[Show more]

Preview 3 out of 16  pages

  • September 24, 2024
  • 16
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Ethical Hacking
  • Ethical Hacking
avatar-seller
twishfrancis
Ethical Hacking Final Exam Questions
and 100% Correct Answers
Which part of the security triad is concerned about denial-of-service attacks
✅Availability

Which phase of the Hacking Methodology is the safest in regards to the target
becoming aware that you are planning an attack against it? ✅Reconnaissance with
OSINT

What type of hacker can be either ethical or unethical, usually dependent on the highest
bidder? ✅gray hat

What type of threat actor would hack a system to discover the names of doctors who
perform abortions and then release those names to the internet in an attempt to spread
anger and hatred among the anti-abortion population? ✅hacktivist

All systems on the internet are at risk from being attacked by hackers. Also, machines
not on the internet, such as air-gapped networks, are similarly at risk. ✅true

______________ exploits are mostly successful because they attack an
undiscovered/unknown vulnerability in a system, ✅zero-day

What is the fundamental difference between hacking and ethical hacking?
✅permissions to conduct the attack

If you secure information in its original form, which of the following are you protecting?
✅integrity

Which of the following is the first step in Ethical Hacking methodology? ✅none of these

A __________________ is someone who does not have the expertise of a hacker and
relies on ready-made tools as they can't write their own code. ✅script kitty

Nmap is considered an active form of reconnaissance. ✅true

The Whois website can be used to find domain and registrar information. ✅true

If theHarvester is provided with a domain name and ___________________, it can
return user information such as: email accounts, host names, and sub-domain names.
✅search engine name

,The command nslookup can query the domain name system. So, you can give it a
domain name and nslookup will return its ip address. ✅true

What tool was demonstrated that could graphically illustrate all of the technologies,
services, and subdomains for a given domain AND the connections between each?
✅Maltego

Using whois.domaintools.com would allow you to find the ip address of a domain.
✅true

Signing up for websites using your personal e-mail address can lead to identity theft
attacks. ✅true

Disabling all unnecessary ports and services is one action a system administrator can
take to harden the system he is overseeing. This is sometimes referred to as a
countermeasure. ✅true

A common and often successful attack vector for hackers is an employee who
unknowingly gives out sensitive information that can provide an entry point into the
system. ✅true

Nmap can provide many types of information such as the services and version number
of the service running on different ports, and what ports are open for connections.
However, it cannot fingerprint an Operating System, that is, determine what OS and
version the system is running. ✅false

What operating system is the popular choice of hackers (both ethical and unethical)
because it comes installed with all types of hacking tools? ✅Kali Linux

Nikto is useful for checking for vulnerabilities in ___________________. ✅Web
servers

Output from a nikto vulnerability scan can be output to html for easier reading and
facilitating research on the weaknesses found. ✅true

The OSVDB (open source vulnerability data base) is a currently maintained data base
that you could use to find the most recent vulnerabilities found in different systems and
ways to mitigate these. ✅false

MBSA is a free security analyzer that IT professionals can use to scan a microsoft-
based system for insecure configuration settings and offers guidance to correct these
insecurities. One of the mitigations demonstrated in class was making sure that
passwords must change periodically. Allowing someone the permission to never change
their password is a great find for hackers! ✅true

, A yellow exclamation point icon is used in a MBSA report to indicate that a critical check
has failed. ✅false

MBSA can generate professional-looking reports that you can present to a client
showing the results of your investigation of the client's system. ✅true

A false positive is a condition that is shown as a result when it does not actually exist.
✅true

The windows operating system is one component that MBSA checks to see if the most
recent updates to the OS have been installed. ✅true

Lynis is a free vulnerability scanning tool used with Windows systems but must be
installed first. ✅false

In social engineering, if an attacker gives fake reason(s) for obtaining sensitive
information (username, password, etc...) from a victim, this is known as
__________________. ✅Pretexting

Which of the following was not a method or technique presented for obtaining sensitive
information from a victim? ✅all can be used to obtain information

This type of phishing attack targets high-level executives of a company like a president,
CIO (chief information officer), CFO (chief financial officer), etc... ✅whaling

Kali Linux has a social engineering tookit called SET that provides an attacker with
various means of help in conducting a social engineering attack. ✅true

Using elicitation, the attacker extracts information from a victim without asking direct
questions. ✅true

What is the name of the browser add-on that can help protect users from phishing
schemes when browsing the web. ✅netcraft

What is the name of the website that contains a repository of phished Websites. You
can enter a URL, and it will provide details of whether it is phished or not. ✅Phishtank

In the lab on social engineering, you used Kali Linux to create a payload that would be
stored on a target machine. When the payload ran it connected back to a listener on the
attack machine. This is known as a Reverse TCP shell. The attackers machine would
then gain control of the session on the target machine and could potentially do all sorts
of nefarious things. In the lab, what service was run to transfer the payload to the target
machine? ✅ftp

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller twishfrancis. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $9.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

84146 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$9.99
  • (0)
  Add to cart