SlideShare a Scribd company logo
1 of 2
Download to read offline
Ethical hacking is the use of hacking tools and techniques to gain access to secure resources to
improve the security posture of an organization.
Group of answer choices
True
False
Question 2
An Ethical Hacker need to have the following knowledge:
Group of answer choices
networks and network protocols
operating systems
CLI interfaces
All of the above
Question 3
When performing an attack, ethical hackers can start at the Recon phase and skip the reporting
phase.
Group of answer choices
True
False
Question 4
Which of the following is NOT the purpose of reconnaissance (the first phase of an attack after
obtaining the permission).
Group of answer choices
Gather Organization Information
Gather Network Information
Gather System Information
Steal the data
Question 5
What is the name of the tool/techniques used in this module to gain access to the remote system?
Group of answer choices
Wireshark
Metasploit Framework
Fsociety
All of the above
Question 6
Which of the following is NOT an attack vector?
Group of answer choices
Unnecessary open Ports
Unpatched services/systems
Vulnerabilities
Strong passwords
Question 7
A reverse shell will set up a listener running on the target/victim machine.
Group of answer choices
True
False
Question 8
The external kali VM attempts to launch a reverse shell attack against the Windows Server 2008 in
our CCIA network. Which of the following is the correct configuration?
Group of answer choices
LHOST: 192.168.10.11, RHOST: 192.168.217.3
LHOST: 192.168.10.10, RHOST: 192.168.217.3
LHOST: 192.168.217.3, RHOST: 192.168.10.10
LHOST: 192.168.217.3, RHOST: 192.168.10.11
Question 9
A bind shell can be used when the target machine is behind a NAT network.
Group of answer choices
True
False
Question 10
The same exploit module targeting the SAME port can work on different target systems.
Group of answer choices
True
False

More Related Content

Similar to Ethical hacking is the use of hacking tools and techniques t.pdf

Ethical hacking11601031 (1)
Ethical hacking11601031 (1)Ethical hacking11601031 (1)
Ethical hacking11601031 (1)
Mohammad Affan
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
samprada123
 
Introduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptxIntroduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptx
youfanlimboo
 

Similar to Ethical hacking is the use of hacking tools and techniques t.pdf (20)

Ethical Hacking: A Comprehensive Cheatsheet
Ethical Hacking: A Comprehensive CheatsheetEthical Hacking: A Comprehensive Cheatsheet
Ethical Hacking: A Comprehensive Cheatsheet
 
Unit 7
Unit 7Unit 7
Unit 7
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Ethical hacking interview questions and answers
Ethical hacking interview questions and answersEthical hacking interview questions and answers
Ethical hacking interview questions and answers
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
 
What is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdfWhat is Ethical Hacking-defination, examples and techniques.pdf
What is Ethical Hacking-defination, examples and techniques.pdf
 
Cyber Kill Chain.pptx
Cyber Kill Chain.pptxCyber Kill Chain.pptx
Cyber Kill Chain.pptx
 
BASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKINGBASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKING
 
Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdf
 
Cis 552 final exam solution
Cis 552 final exam solutionCis 552 final exam solution
Cis 552 final exam solution
 
Ethical hacking11601031 (1)
Ethical hacking11601031 (1)Ethical hacking11601031 (1)
Ethical hacking11601031 (1)
 
Final report ethical hacking
Final report ethical hackingFinal report ethical hacking
Final report ethical hacking
 
Introduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptxIntroduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptx
 
Ethical Hacking : Understanding the Basics
Ethical Hacking : Understanding the BasicsEthical Hacking : Understanding the Basics
Ethical Hacking : Understanding the Basics
 
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical ApproachIRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
 
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptx
 
CEH Cheat Sheet.pdf
CEH Cheat Sheet.pdfCEH Cheat Sheet.pdf
CEH Cheat Sheet.pdf
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Introduction to ethical hacking
Introduction to ethical hackingIntroduction to ethical hacking
Introduction to ethical hacking
 
Network Penetration Testing Service
Network Penetration Testing ServiceNetwork Penetration Testing Service
Network Penetration Testing Service
 

More from info334223

51 Case Study 21 Whom Would You Hire More texttospeech.pdf
51 Case Study 21  Whom Would You Hire More texttospeech.pdf51 Case Study 21  Whom Would You Hire More texttospeech.pdf
51 Case Study 21 Whom Would You Hire More texttospeech.pdf
info334223
 
1818 LAB Grocery shopping list linked list inserting at .pdf
1818 LAB Grocery shopping list linked list inserting at .pdf1818 LAB Grocery shopping list linked list inserting at .pdf
1818 LAB Grocery shopping list linked list inserting at .pdf
info334223
 
Aeropuerto Internacional de Denver FONDO Cmo se conviert.pdf
Aeropuerto Internacional de Denver  FONDO  Cmo se conviert.pdfAeropuerto Internacional de Denver  FONDO  Cmo se conviert.pdf
Aeropuerto Internacional de Denver FONDO Cmo se conviert.pdf
info334223
 
This is the main file include itemh include itemList.pdf
This is the main file include itemh include itemList.pdfThis is the main file include itemh include itemList.pdf
This is the main file include itemh include itemList.pdf
info334223
 

More from info334223 (20)

Assume Victoria Inc VI has some outstanding bonds that ma.pdf
Assume Victoria Inc VI has some outstanding bonds that ma.pdfAssume Victoria Inc VI has some outstanding bonds that ma.pdf
Assume Victoria Inc VI has some outstanding bonds that ma.pdf
 
At December 312020 Marin Corporation had a deferred tax l.pdf
At December 312020  Marin Corporation had a deferred tax l.pdfAt December 312020  Marin Corporation had a deferred tax l.pdf
At December 312020 Marin Corporation had a deferred tax l.pdf
 
Aratrmaclar E coli tarafndan tipik olarak tketilmeyen bir.pdf
Aratrmaclar E coli tarafndan tipik olarak tketilmeyen bir.pdfAratrmaclar E coli tarafndan tipik olarak tketilmeyen bir.pdf
Aratrmaclar E coli tarafndan tipik olarak tketilmeyen bir.pdf
 
51 Case Study 21 Whom Would You Hire More texttospeech.pdf
51 Case Study 21  Whom Would You Hire More texttospeech.pdf51 Case Study 21  Whom Would You Hire More texttospeech.pdf
51 Case Study 21 Whom Would You Hire More texttospeech.pdf
 
6 A medical practice group consists of nine doctors four w.pdf
6 A medical practice group consists of nine doctors four w.pdf6 A medical practice group consists of nine doctors four w.pdf
6 A medical practice group consists of nine doctors four w.pdf
 
2 Adding Command Now we implement the filecopy command cp .pdf
2 Adding Command Now we implement the filecopy command cp .pdf2 Adding Command Now we implement the filecopy command cp .pdf
2 Adding Command Now we implement the filecopy command cp .pdf
 
1How will you manage building this infrastructure and appli.pdf
1How will you manage building this infrastructure and appli.pdf1How will you manage building this infrastructure and appli.pdf
1How will you manage building this infrastructure and appli.pdf
 
1818 LAB Grocery shopping list linked list inserting at .pdf
1818 LAB Grocery shopping list linked list inserting at .pdf1818 LAB Grocery shopping list linked list inserting at .pdf
1818 LAB Grocery shopping list linked list inserting at .pdf
 
Dr Foleys new type of agriculture that he described as fa.pdf
Dr Foleys new type of agriculture that he described as fa.pdfDr Foleys new type of agriculture that he described as fa.pdf
Dr Foleys new type of agriculture that he described as fa.pdf
 
Aeropuerto Internacional de Denver FONDO Cmo se conviert.pdf
Aeropuerto Internacional de Denver  FONDO  Cmo se conviert.pdfAeropuerto Internacional de Denver  FONDO  Cmo se conviert.pdf
Aeropuerto Internacional de Denver FONDO Cmo se conviert.pdf
 
A sample of size 39 was gathered from high school seniors to.pdf
A sample of size 39 was gathered from high school seniors to.pdfA sample of size 39 was gathered from high school seniors to.pdf
A sample of size 39 was gathered from high school seniors to.pdf
 
While Mary Corens was a student at the University of Tenness.pdf
While Mary Corens was a student at the University of Tenness.pdfWhile Mary Corens was a student at the University of Tenness.pdf
While Mary Corens was a student at the University of Tenness.pdf
 
what is the significance related to reproduction and the sig.pdf
what is the significance related to reproduction and the sig.pdfwhat is the significance related to reproduction and the sig.pdf
what is the significance related to reproduction and the sig.pdf
 
When oxygen is present which pair of processes allow conver.pdf
When oxygen is present which pair of processes allow conver.pdfWhen oxygen is present which pair of processes allow conver.pdf
When oxygen is present which pair of processes allow conver.pdf
 
v f alculete the leogti mad varance of the Criting Phis d.pdf
v f alculete the leogti mad varance of the Criting Phis d.pdfv f alculete the leogti mad varance of the Criting Phis d.pdf
v f alculete the leogti mad varance of the Criting Phis d.pdf
 
This is the main file include itemh include itemList.pdf
This is the main file include itemh include itemList.pdfThis is the main file include itemh include itemList.pdf
This is the main file include itemh include itemList.pdf
 
423 A survey of 1000 US government employees who have an.pdf
423 A survey of 1000 US government employees who have an.pdf423 A survey of 1000 US government employees who have an.pdf
423 A survey of 1000 US government employees who have an.pdf
 
The following partial information is taken from the comparat.pdf
The following partial information is taken from the comparat.pdfThe following partial information is taken from the comparat.pdf
The following partial information is taken from the comparat.pdf
 
3 Lets suppose the A600 of your 1100 diluted culture is 0.pdf
3 Lets suppose the A600 of your 1100 diluted culture is 0.pdf3 Lets suppose the A600 of your 1100 diluted culture is 0.pdf
3 Lets suppose the A600 of your 1100 diluted culture is 0.pdf
 
Select a business or organization of your choice Choose tw.pdf
Select a business or organization of your choice  Choose tw.pdfSelect a business or organization of your choice  Choose tw.pdf
Select a business or organization of your choice Choose tw.pdf
 

Recently uploaded

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 

Recently uploaded (20)

Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 

Ethical hacking is the use of hacking tools and techniques t.pdf

  • 1. Ethical hacking is the use of hacking tools and techniques to gain access to secure resources to improve the security posture of an organization. Group of answer choices True False Question 2 An Ethical Hacker need to have the following knowledge: Group of answer choices networks and network protocols operating systems CLI interfaces All of the above Question 3 When performing an attack, ethical hackers can start at the Recon phase and skip the reporting phase. Group of answer choices True False Question 4 Which of the following is NOT the purpose of reconnaissance (the first phase of an attack after obtaining the permission). Group of answer choices Gather Organization Information Gather Network Information Gather System Information Steal the data Question 5 What is the name of the tool/techniques used in this module to gain access to the remote system? Group of answer choices Wireshark Metasploit Framework Fsociety All of the above Question 6 Which of the following is NOT an attack vector? Group of answer choices Unnecessary open Ports Unpatched services/systems Vulnerabilities Strong passwords Question 7 A reverse shell will set up a listener running on the target/victim machine.
  • 2. Group of answer choices True False Question 8 The external kali VM attempts to launch a reverse shell attack against the Windows Server 2008 in our CCIA network. Which of the following is the correct configuration? Group of answer choices LHOST: 192.168.10.11, RHOST: 192.168.217.3 LHOST: 192.168.10.10, RHOST: 192.168.217.3 LHOST: 192.168.217.3, RHOST: 192.168.10.10 LHOST: 192.168.217.3, RHOST: 192.168.10.11 Question 9 A bind shell can be used when the target machine is behind a NAT network. Group of answer choices True False Question 10 The same exploit module targeting the SAME port can work on different target systems. Group of answer choices True False