Ethical Hacking Final Exam Questions and 100% Correct Answers
1 view 0 purchase
Course
Ethical Hacking
Institution
Ethical Hacking
Which part of the security triad is concerned about denial-of-service attacks Availability
Which phase of the Hacking Methodology is the safest in regards to the target becoming aware that you are planning an attack against it? Reconnaissance with OSINT
What type of hacker can be either ethical o...
Ethical Hacking Final Exam Questions
and 100% Correct Answers
Which part of the security triad is concerned about denial-of-service attacks
✅Availability
Which phase of the Hacking Methodology is the safest in regards to the target
becoming aware that you are planning an attack against it? ✅Reconnaissance with
OSINT
What type of hacker can be either ethical or unethical, usually dependent on the highest
bidder? ✅gray hat
What type of threat actor would hack a system to discover the names of doctors who
perform abortions and then release those names to the internet in an attempt to spread
anger and hatred among the anti-abortion population? ✅hacktivist
All systems on the internet are at risk from being attacked by hackers. Also, machines
not on the internet, such as air-gapped networks, are similarly at risk. ✅true
______________ exploits are mostly successful because they attack an
undiscovered/unknown vulnerability in a system, ✅zero-day
What is the fundamental difference between hacking and ethical hacking?
✅permissions to conduct the attack
If you secure information in its original form, which of the following are you protecting?
✅integrity
Which of the following is the first step in Ethical Hacking methodology? ✅none of these
A __________________ is someone who does not have the expertise of a hacker and
relies on ready-made tools as they can't write their own code. ✅script kitty
Nmap is considered an active form of reconnaissance. ✅true
The Whois website can be used to find domain and registrar information. ✅true
If theHarvester is provided with a domain name and ___________________, it can
return user information such as: email accounts, host names, and sub-domain names.
✅search engine name
,The command nslookup can query the domain name system. So, you can give it a
domain name and nslookup will return its ip address. ✅true
What tool was demonstrated that could graphically illustrate all of the technologies,
services, and subdomains for a given domain AND the connections between each?
✅Maltego
Using whois.domaintools.com would allow you to find the ip address of a domain.
✅true
Signing up for websites using your personal e-mail address can lead to identity theft
attacks. ✅true
Disabling all unnecessary ports and services is one action a system administrator can
take to harden the system he is overseeing. This is sometimes referred to as a
countermeasure. ✅true
A common and often successful attack vector for hackers is an employee who
unknowingly gives out sensitive information that can provide an entry point into the
system. ✅true
Nmap can provide many types of information such as the services and version number
of the service running on different ports, and what ports are open for connections.
However, it cannot fingerprint an Operating System, that is, determine what OS and
version the system is running. ✅false
What operating system is the popular choice of hackers (both ethical and unethical)
because it comes installed with all types of hacking tools? ✅Kali Linux
Nikto is useful for checking for vulnerabilities in ___________________. ✅Web
servers
Output from a nikto vulnerability scan can be output to html for easier reading and
facilitating research on the weaknesses found. ✅true
The OSVDB (open source vulnerability data base) is a currently maintained data base
that you could use to find the most recent vulnerabilities found in different systems and
ways to mitigate these. ✅false
MBSA is a free security analyzer that IT professionals can use to scan a microsoft-
based system for insecure configuration settings and offers guidance to correct these
insecurities. One of the mitigations demonstrated in class was making sure that
passwords must change periodically. Allowing someone the permission to never change
their password is a great find for hackers! ✅true
, A yellow exclamation point icon is used in a MBSA report to indicate that a critical check
has failed. ✅false
MBSA can generate professional-looking reports that you can present to a client
showing the results of your investigation of the client's system. ✅true
A false positive is a condition that is shown as a result when it does not actually exist.
✅true
The windows operating system is one component that MBSA checks to see if the most
recent updates to the OS have been installed. ✅true
Lynis is a free vulnerability scanning tool used with Windows systems but must be
installed first. ✅false
In social engineering, if an attacker gives fake reason(s) for obtaining sensitive
information (username, password, etc...) from a victim, this is known as
__________________. ✅Pretexting
Which of the following was not a method or technique presented for obtaining sensitive
information from a victim? ✅all can be used to obtain information
This type of phishing attack targets high-level executives of a company like a president,
CIO (chief information officer), CFO (chief financial officer), etc... ✅whaling
Kali Linux has a social engineering tookit called SET that provides an attacker with
various means of help in conducting a social engineering attack. ✅true
Using elicitation, the attacker extracts information from a victim without asking direct
questions. ✅true
What is the name of the browser add-on that can help protect users from phishing
schemes when browsing the web. ✅netcraft
What is the name of the website that contains a repository of phished Websites. You
can enter a URL, and it will provide details of whether it is phished or not. ✅Phishtank
In the lab on social engineering, you used Kali Linux to create a payload that would be
stored on a target machine. When the payload ran it connected back to a listener on the
attack machine. This is known as a Reverse TCP shell. The attackers machine would
then gain control of the session on the target machine and could potentially do all sorts
of nefarious things. In the lab, what service was run to transfer the payload to the target
machine? ✅ftp
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller twishfrancis. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $9.99. You're not tied to anything after your purchase.