Ethical Hacking – Examination
Quiz Summary
0 of 50 Questions completed
Questions:
Information
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
Results
Results
0 of 50 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 50
1. Question
Question 1
Which of the following statements best describes a white-hat hacker?CorrectIncorrect -
Question 2 of 50
2. Question
Question 2
A security audit performed on the internal network of an organization by the network administration is also known as?CorrectIncorrect -
Question 3 of 50
3. Question
Question 3
What is the first phase of hacking?CorrectIncorrect -
Question 4 of 50
4. Question
Question 4
Which type of hacker represents the highest risk to your network?CorrectIncorrectHint
They are staff of that organisation.
-
Question 5 of 50
5. Question
Question 5
Hacking for a cause is called?CorrectIncorrectHint
The anonymous group.
-
Question 6 of 50
6. Question
Question 6
When a hacker attempts to attack a host via the Internet it is known as what type of attack?CorrectIncorrectHint
Synonym for online job.
-
Question 7 of 50
7. Question
Question 7
Which phase of hacking performs actual attack on a network or system?CorrectIncorrect -
Question 8 of 50
8. Question
Question 8
What is the best statement for taking advantage of a weakness in the security of an IT system?
CorrectIncorrectHint
A weakness in security is exploited. An attack does the exploitation. A weakness is vulnerability. A threat is a potential vulnerability.
-
Question 9 of 50
9. Question
Question 9
What is the next step to be performed after footprinting?CorrectIncorrect -
Question 10 of 50
10. Question
Question 10
Which of the following command is used to create file in Linux?CorrectIncorrect -
Question 11 of 50
11. Question
Question 11
Which command is/are used to remove directory in Linux?CorrectIncorrect -
Question 12 of 50
12. Question
Question 12
Which command(s) is/are used to get help about a command in Linux?CorrectIncorrect -
Question 13 of 50
13. Question
Question 13
Which of the following OS is not based on Linux?
CorrectIncorrect -
Question 14 of 50
14. Question
Question 14
What command is used to list contents of directories?
CorrectIncorrect -
Question 15 of 50
15. Question
Question 15
Hidden files can be seen using?CorrectIncorrect -
Question 16 of 50
16. Question
Question 16
Which of the following directories contains configuration files in linux?CorrectIncorrect -
Question 17 of 50
17. Question
Question 17
mv command can be used for?CorrectIncorrect -
Question 18 of 50
18. Question
Question 18
Why would hackers want to cover their tracks?CorrectIncorrect -
Question 19 of 50
19. Question
Question 19
Which of the following is a system designed to attract and identify hackers?CorrectIncorrect -
Question 20 of 50
20. Question
Question 20
A system that performs attack recognition and alerting for a network is what?CorrectIncorrect -
Question 21 of 50
21. Question
Question 21Â
Why would a hacker use a proxy server?CorrectIncorrect -
Question 22 of 50
22. Question
Question 22
How does traceroute work?CorrectIncorrect -
Question 23 of 50
23. Question
Question 23
What is footprinting?CorrectIncorrect -
Question 24 of 50
24. Question
Question 24
Which tool can be used to perform a DNS zone transfer?CorrectIncorrect -
Question 25 of 50
25. Question
Question 25
dnsenum can be used to gather information regarding which of the following?CorrectIncorrect -
Question 26 of 50
26. Question
Question 26
What does the TCP RST command do?CorrectIncorrect -
Question 27 of 50
27. Question
Question 27
What is the proper sequence of a TCP connection?CorrectIncorrect -
Question 28 of 50
28. Question
Question 28
Which of the following is a passive online attack?CorrectIncorrect -
Question 29 of 50
29. Question
Question 29
What is sniffing?CorrectIncorrect -
Question 30 of 50
30. Question
Question 30
What is a countermeasure to passive sniffing?CorrectIncorrect -
Question 31 of 50
31. Question
Question 31
What is snort?CorrectIncorrect -
Question 32 of 50
32. Question
Question 32
What mode must a network card operate in to perform sniffing?CorrectIncorrect -
Question 33 of 50
33. Question
Question 33
The best defense against any type of sniffing is?CorrectIncorrect -
Question 34 of 50
34. Question
Question 34
What port number does FTP use?CorrectIncorrect -
Question 35 of 50
35. Question
Question 35
What is the main problem with using only ICMP queries for scanning?CorrectIncorrect -
Question 36 of 50
36. Question
Question 36
What is the proper command to perform and NMAP SYN scan every 5 minutes?CorrectIncorrect -
Question 37 of 50
37. Question
Question 37
Why would an attacker want to perform a scan on port 137?CorrectIncorrect -
Question 38 of 50
38. Question
Question 38
Why would the network security team be concerned about ports 135–139 being open on a system?CorrectIncorrect -
Question 39 of 50
39. Question
Question 39
What is enumeration?CorrectIncorrect -
Question 40 of 50
40. Question
Question 40
What is the proper command to perform an Nmap XMAS scan every 15seconds?CorrectIncorrect -
Question 41 of 50
41. Question
Question 41
Why would a ping sweep be used?CorrectIncorrect -
Question 42 of 50
42. Question
Question 42
A packet with no flags set is which type of scan?CorrectIncorrect -
Question 43 of 50
43. Question
Question 43
What port number does HTTPS use?CorrectIncorrect -
Question 44 of 50
44. Question
Question 44
What is the purpose of a pen test?CorrectIncorrect -
Question 45 of 50
45. Question
Question 45
Security assessment categories include which of the following? (Choose all that apply.)CorrectIncorrect -
Question 46 of 50
46. Question
Question 46
What type of testing is the best option for an organization that can benefit from the experience of a security professional?CorrectIncorrect -
Question 47 of 50
47. Question
Question 47
Which type of audit tests the security implementation and access controls in an organization?CorrectIncorrect -
Question 48 of 50
48. Question
Question 48
An assessment report for management may include suggested fixes or corrective measures.CorrectIncorrect -
Question 49 of 50
49. Question
Question 49
What are some of the most common vulnerabilities that exist in a network or system?CorrectIncorrect -
Question 50 of 50
50. Question
Question 50
What is the first step of a pen test?CorrectIncorrect