Que.How many basic processes or steps are there in ethical hacking?
|
a. 4 |
b. 5 |
c. 6 |
d. 7 |
Que.____________ is the information gathering phase in ethical hacking from the target user.
|
a. Reconnaissance |
b. Scanning |
c. Gaining access |
d. Maintaining access |
Que.Which of the following is not a reconnaissance tool or technique for information gathering?
|
a. Hping |
b. NMAP |
c. Google Dorks |
d. Nexpose |
Que.There are ______ subtypes of reconnaissance.
|
a. 2 |
b. 3 |
c. 4 |
d. 5 |
Que.Which of the following is an example of active reconnaissance?
|
a. Searching public records |
b. Telephone calls as a help desk or fake customer care person |
c. Looking for the target’s details in the database |
d. Searching the target’s details in paper files |
Telephone calls as a help desk or fake customer care person
Que.Which of the following is an example of passive reconnaissance?
|
a. Telephonic calls to target victim |
b. Attacker as a fake person for Help Desk support |
c. Talk to the target user in person |
d. Search about target records in online people database |
Search about target records in online people database
Que.________ phase in ethical hacking is known as the pre-attack phase.
|
a. Reconnaissance |
b. Scanning |
c. Gaining access |
d. Maintaining access |
Que.While looking for a single entry point where penetration testers can test the vulnerability, they use ______ phase of ethical hacking.
|
a. Reconnaissance |
b. Scanning |
c. Gaining access |
d. Maintaining access |
Que.Which of them does not comes under scanning methodologies?
|
a. Vulnerability scanning |
b. Sweeping |
c. Port Scanning |
d. Google Dorks |
Que.Which of them is not a scanning tool?
|
a. NMAP |
b. Nexpose |
c. Maltego |
d. Nessus |