Free Ethical Hacking Professional Certification

Get Ethical Hacking Certificate from Itronix Solutions which you can share in the Certifications section of your LinkedIn profile, on printed resumes, CVs, or other documents.

Exam Details
  • Format: Multiple Choice Question
  • Questions: 10
  • Passing Score: 8/10 or 80%
  • Language: English

What is the purpose of a penetration test?
*

10 points

To identify vulnerabilities in a system or network
To exploit vulnerabilities in a system or network
To fix vulnerabilities in a system or network
To steal sensitive information from a system or network

What is SQL injection?
*

10 points

A technique to identify vulnerabilities in a system or network
A technique to exploit vulnerabilities in a system or network
A technique to fix vulnerabilities in a system or network
A technique to steal sensitive information from a system or network

What is a honeypot?
*

10 points

A device used to lure attackers into a trap
A type of malware that spreads through a network
A tool used to test network performance
A device used to monitor network traffic

What is the attack called “evil twin”?
*

10 points

Rogue access point
ARP poisoning
Session hijacking
MAC spoofing

What are the forms of password cracking techniques?
*

10 points

AttackSyllable
AttackBrute Forcing
AttacksHybrid
All of the above

What does the TCP RST command do?
*

10 points

Restores the connection to a previous state
Finishes a TCP connections
Resets the TCP connection
Starts a TCP connection

A packet with all flags set is which type of scan?
*

10 points

Full Open
XMAS
TCP connect
D.Syn scan

An unauthorized individual enters a building following an employee through the employee entrance after the lunch rush. What type of breach has the individual just performed?*

10 points

AReverse Social Engineering
Tailgating
Piggybacking
Announced

Why would an attacker want to perform a scan on port 137?
*

10 points

To check for file and print sharing on Windows systems
To discover proxy servers on a network
To discover a target system with the NetBIOS null session vulnerability
To locate the FTP service on the target host

If an attacker uses the command SELECT*FROM user WHERE name = ‘x’ AND userid IS NULL; –‘; which type of SQL injection attack is the attacker performing?
*

10 points

End of Line Comment
UNION SQL Injection
Illegal/Logically Incorrect Query
Tautology

Apply Link

error: Content is protected !!
Scroll to Top