Que.Which of the following comes after scanning phase in ethical hacking?
|
a. Scanning |
b. Maintaining access |
c. Reconnaissance |
d. Gaining access |
Que.In __________ phase the hacker exploits the network or system vulnerabilities.
|
a. Scanning |
b. Maintaining access |
c. Reconnaissance |
d. Gaining access |
Que.Which of the following is not done in gaining access phase?
|
a. Tunnelling |
b. Buffer overflow |
c. Session hijacking |
d. Password cracking |
Que.Which of the below-mentioned penetration testing tool is popularly used in gaining access phase?
|
a. Maltego |
b. NMAP |
c. Metasploit |
d. Nessus |
Que.A _________ can gain access illegally to a system if the system is not properly tested in scanning and gaining access phase.
|
a. security officer |
b. malicious hacker |
c. security auditor |
d. network analyst |
Que.In which phase, the hackers install backdoors so that his/her ownership with the victim’s system can be retained later?
|
a. Scanning |
b. Maintaining access |
c. Maintaining Access |
d. Gaining access |
Que._______ is the tool used for this purpose.
|
a. Powersploit |
b. Aircrack – ng |
c. Snort |
d. Nmap |
Que.Which of the following hacking tools and techniques hackers’ do not use for maintaining access in a system?
|
a. Rootkits |
b. Backdoors |
c. Trojans |
d. Wireshark |
Que.In _______ phase, the hackers try to hide their footprints.
|
a. Scanning |
b. Tracks clearing |
c. Reconnaissance |
d. Gaining access |
Que.Which of them is not a track clearing technique?
|
a. Altering log files |
b. Tunnelling |
c. Port Scanning |
d. Footprint removing |