cyber securite and element set 5

Que.How many basic processes or steps are there in ethical hacking?
a. 4
b. 5
c. 6
d. 7
Que.____________ is the information gathering phase in ethical hacking from the target user.
a. Reconnaissance
b. Scanning
c. Gaining access
d. Maintaining access
Que.Which of the following is not a reconnaissance tool or technique for information gathering?
a. Hping
b. NMAP
c. Google Dorks
d. Nexpose
Que.There are ______ subtypes of reconnaissance.
a. 2
b. 3
c. 4
d. 5
Que.Which of the following is an example of active reconnaissance?
a. Searching public records
b. Telephone calls as a help desk or fake customer care person
c. Looking for the target’s details in the database
d. Searching the target’s details in paper files
Que.Which of the following is an example of passive reconnaissance?
a. Telephonic calls to target victim
b. Attacker as a fake person for Help Desk support
c. Talk to the target user in person
d. Search about target records in online people database
Que.________ phase in ethical hacking is known as the pre-attack phase.
a. Reconnaissance
b. Scanning
c. Gaining access
d. Maintaining access
Que.While looking for a single entry point where penetration testers can test the vulnerability, they use ______ phase of ethical hacking.
a. Reconnaissance
b. Scanning
c. Gaining access
d. Maintaining access
Que.Which of them does not comes under scanning methodologies?
a. Vulnerability scanning
b. Sweeping
c. Port Scanning
d. Google Dorks
Que.Which of them is not a scanning tool?
a. NMAP
b. Nexpose
c. Maltego
d. Nessus