Get Ethical Hacking Certificate from Itronix Solutions which you can share in the Certifications section of your LinkedIn profile, on printed resumes, CVs, or other documents.
- Format: Multiple Choice Question
- Questions: 10
- Passing Score: 8/10 or 80%
- Language: English
What is the purpose of a penetration test?
*
10 points
To identify vulnerabilities in a system or network
To exploit vulnerabilities in a system or network
To fix vulnerabilities in a system or network
To steal sensitive information from a system or network
What is SQL injection?
*
10 points
A technique to identify vulnerabilities in a system or network
A technique to exploit vulnerabilities in a system or network
A technique to fix vulnerabilities in a system or network
A technique to steal sensitive information from a system or network
What is a honeypot?
*
10 points
A device used to lure attackers into a trap
A type of malware that spreads through a network
A tool used to test network performance
A device used to monitor network traffic
What is the attack called “evil twin”?
*
10 points
Rogue access point
ARP poisoning
Session hijacking
MAC spoofing
What are the forms of password cracking techniques?
*
10 points
AttackSyllable
AttackBrute Forcing
AttacksHybrid
All of the above
What does the TCP RST command do?
*
10 points
Restores the connection to a previous state
Finishes a TCP connections
Resets the TCP connection
Starts a TCP connection
A packet with all flags set is which type of scan?
*
10 points
Full Open
XMAS
TCP connect
D.Syn scan
An unauthorized individual enters a building following an employee through the employee entrance after the lunch rush. What type of breach has the individual just performed?*
10 points
AReverse Social Engineering
Tailgating
Piggybacking
Announced
Why would an attacker want to perform a scan on port 137?
*
10 points
To check for file and print sharing on Windows systems
To discover proxy servers on a network
To discover a target system with the NetBIOS null session vulnerability
To locate the FTP service on the target host
If an attacker uses the command SELECT*FROM user WHERE name = ‘x’ AND userid IS NULL; –‘; which type of SQL injection attack is the attacker performing?
*
10 points
End of Line Comment
UNION SQL Injection
Illegal/Logically Incorrect Query
Tautology