Ethical hacking is the use of hacking tools and techniques to gain access to secure resources to improve the security posture of an organization. Group of answer choices True False Question 2 An Ethical Hacker need to have the following knowledge: Group of answer choices networks and network protocols operating systems CLI interfaces All of the above Question 3 When performing an attack, ethical hackers can start at the Recon phase and skip the reporting phase. Group of answer choices True False Question 4 Which of the following is NOT the purpose of reconnaissance (the first phase of an attack after obtaining the permission). Group of answer choices Gather Organization Information Gather Network Information Gather System Information Steal the data Question 5 What is the name of the tool/techniques used in this module to gain access to the remote system? Group of answer choices Wireshark Metasploit Framework Fsociety All of the above Question 6 Which of the following is NOT an attack vector? Group of answer choices Unnecessary open Ports Unpatched services/systems Vulnerabilities Strong passwords Question 7 A reverse shell will set up a listener running on the target/victim machine. Group of answer choices True False Question 8 The external kali VM attempts to launch a reverse shell attack against the Windows Server 2008 in our CCIA network. Which of the following is the correct configuration? Group of answer choices LHOST: 192.168.10.11, RHOST: 192.168.217.3 LHOST: 192.168.10.10, RHOST: 192.168.217.3 LHOST: 192.168.217.3, RHOST: 192.168.10.10 LHOST: 192.168.217.3, RHOST: 192.168.10.11 Question 9 A bind shell can be used when the target machine is behind a NAT network. Group of answer choices True False Question 10 The same exploit module targeting the SAME port can work on different target systems. Group of answer choices True False.