SlideShare a Scribd company logo
Ethical hacking is the use of hacking tools and techniques to gain access to secure resources to
improve the security posture of an organization.
Group of answer choices
True
False
Question 2
An Ethical Hacker need to have the following knowledge:
Group of answer choices
networks and network protocols
operating systems
CLI interfaces
All of the above
Question 3
When performing an attack, ethical hackers can start at the Recon phase and skip the reporting
phase.
Group of answer choices
True
False
Question 4
Which of the following is NOT the purpose of reconnaissance (the first phase of an attack after
obtaining the permission).
Group of answer choices
Gather Organization Information
Gather Network Information
Gather System Information
Steal the data
Question 5
What is the name of the tool/techniques used in this module to gain access to the remote system?
Group of answer choices
Wireshark
Metasploit Framework
Fsociety
All of the above
Question 6
Which of the following is NOT an attack vector?
Group of answer choices
Unnecessary open Ports
Unpatched services/systems
Vulnerabilities
Strong passwords
Question 7
A reverse shell will set up a listener running on the target/victim machine.
Group of answer choices
True
False
Question 8
The external kali VM attempts to launch a reverse shell attack against the Windows Server 2008 in
our CCIA network. Which of the following is the correct configuration?
Group of answer choices
LHOST: 192.168.10.11, RHOST: 192.168.217.3
LHOST: 192.168.10.10, RHOST: 192.168.217.3
LHOST: 192.168.217.3, RHOST: 192.168.10.10
LHOST: 192.168.217.3, RHOST: 192.168.10.11
Question 9
A bind shell can be used when the target machine is behind a NAT network.
Group of answer choices
True
False
Question 10
The same exploit module targeting the SAME port can work on different target systems.
Group of answer choices
True
False

More Related Content

PPTX
Ethical hacking introduction to ethical hacking
PPTX
Ethical hacking introduction to ethical hacking
PDF
IRJET- Study of Hacking and Ethical Hacking
PDF
Vulnerability Prevention Using Ethical Hacking.pdf
PPTX
A Deep Introduction to Ethical Hacking
DOCX
ethical hacking report
PDF
Itis pentest slides hyd
DOCX
Ethical Hacking
Ethical hacking introduction to ethical hacking
Ethical hacking introduction to ethical hacking
IRJET- Study of Hacking and Ethical Hacking
Vulnerability Prevention Using Ethical Hacking.pdf
A Deep Introduction to Ethical Hacking
ethical hacking report
Itis pentest slides hyd
Ethical Hacking

Similar to Ethical hacking is the use of hacking tools and techniques t.pdf (20)

PDF
Ethical Hacking: A Comprehensive Cheatsheet
PPTX
Dr.J.Jegan - Ethical Hacking - 06.12.2024.pptx
PPTX
Ethical Hacking
PDF
Ethical hacking interview questions and answers
PPTX
Introduction ethical hacking
PDF
What is Ethical Hacking-defination, examples and techniques.pdf
PPTX
Cyber Kill Chain.pptx
PDF
BASICS OF ETHICAL HACKING
PDF
Ethical Hacking Interview Questions and Answers.pdf
DOCX
Cis 552 final exam solution
PPTX
Ethical hacking11601031 (1)
DOCX
Final report ethical hacking
PPTX
Introduction to Pre-Cybersecurity.pptx
PDF
Ethical Hacking : Understanding the Basics
PDF
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
PPTX
GETTING STARTED WITH THE ETHICAL HACKING.pptx
PDF
CEH Cheat Sheet.pdf
PPTX
Ethical hacking
PPTX
Introduction to ethical hacking
Ethical Hacking: A Comprehensive Cheatsheet
Dr.J.Jegan - Ethical Hacking - 06.12.2024.pptx
Ethical Hacking
Ethical hacking interview questions and answers
Introduction ethical hacking
What is Ethical Hacking-defination, examples and techniques.pdf
Cyber Kill Chain.pptx
BASICS OF ETHICAL HACKING
Ethical Hacking Interview Questions and Answers.pdf
Cis 552 final exam solution
Ethical hacking11601031 (1)
Final report ethical hacking
Introduction to Pre-Cybersecurity.pptx
Ethical Hacking : Understanding the Basics
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
GETTING STARTED WITH THE ETHICAL HACKING.pptx
CEH Cheat Sheet.pdf
Ethical hacking
Introduction to ethical hacking

More from info334223 (20)

PDF
Assume Victoria Inc VI has some outstanding bonds that ma.pdf
PDF
At December 312020 Marin Corporation had a deferred tax l.pdf
PDF
Aratrmaclar E coli tarafndan tipik olarak tketilmeyen bir.pdf
PDF
51 Case Study 21 Whom Would You Hire More texttospeech.pdf
PDF
6 A medical practice group consists of nine doctors four w.pdf
PDF
2 Adding Command Now we implement the filecopy command cp .pdf
PDF
1How will you manage building this infrastructure and appli.pdf
PDF
1818 LAB Grocery shopping list linked list inserting at .pdf
PDF
Dr Foleys new type of agriculture that he described as fa.pdf
PDF
Aeropuerto Internacional de Denver FONDO Cmo se conviert.pdf
PDF
A sample of size 39 was gathered from high school seniors to.pdf
PDF
While Mary Corens was a student at the University of Tenness.pdf
PDF
what is the significance related to reproduction and the sig.pdf
PDF
When oxygen is present which pair of processes allow conver.pdf
PDF
v f alculete the leogti mad varance of the Criting Phis d.pdf
PDF
This is the main file include itemh include itemList.pdf
PDF
423 A survey of 1000 US government employees who have an.pdf
PDF
The following partial information is taken from the comparat.pdf
PDF
3 Lets suppose the A600 of your 1100 diluted culture is 0.pdf
PDF
Select a business or organization of your choice Choose tw.pdf
Assume Victoria Inc VI has some outstanding bonds that ma.pdf
At December 312020 Marin Corporation had a deferred tax l.pdf
Aratrmaclar E coli tarafndan tipik olarak tketilmeyen bir.pdf
51 Case Study 21 Whom Would You Hire More texttospeech.pdf
6 A medical practice group consists of nine doctors four w.pdf
2 Adding Command Now we implement the filecopy command cp .pdf
1How will you manage building this infrastructure and appli.pdf
1818 LAB Grocery shopping list linked list inserting at .pdf
Dr Foleys new type of agriculture that he described as fa.pdf
Aeropuerto Internacional de Denver FONDO Cmo se conviert.pdf
A sample of size 39 was gathered from high school seniors to.pdf
While Mary Corens was a student at the University of Tenness.pdf
what is the significance related to reproduction and the sig.pdf
When oxygen is present which pair of processes allow conver.pdf
v f alculete the leogti mad varance of the Criting Phis d.pdf
This is the main file include itemh include itemList.pdf
423 A survey of 1000 US government employees who have an.pdf
The following partial information is taken from the comparat.pdf
3 Lets suppose the A600 of your 1100 diluted culture is 0.pdf
Select a business or organization of your choice Choose tw.pdf

Recently uploaded (20)

PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
RMMM.pdf make it easy to upload and study
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PPTX
Institutional Correction lecture only . . .
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PPTX
Cell Structure & Organelles in detailed.
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Presentation on HIE in infants and its manifestations
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
human mycosis Human fungal infections are called human mycosis..pptx
RMMM.pdf make it easy to upload and study
STATICS OF THE RIGID BODIES Hibbelers.pdf
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Institutional Correction lecture only . . .
O5-L3 Freight Transport Ops (International) V1.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Chinmaya Tiranga quiz Grand Finale.pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Cell Structure & Organelles in detailed.
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Presentation on HIE in infants and its manifestations
Module 4: Burden of Disease Tutorial Slides S2 2025
Final Presentation General Medicine 03-08-2024.pptx
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
O7-L3 Supply Chain Operations - ICLT Program
GDM (1) (1).pptx small presentation for students
Microbial diseases, their pathogenesis and prophylaxis
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf

Ethical hacking is the use of hacking tools and techniques t.pdf

  • 1. Ethical hacking is the use of hacking tools and techniques to gain access to secure resources to improve the security posture of an organization. Group of answer choices True False Question 2 An Ethical Hacker need to have the following knowledge: Group of answer choices networks and network protocols operating systems CLI interfaces All of the above Question 3 When performing an attack, ethical hackers can start at the Recon phase and skip the reporting phase. Group of answer choices True False Question 4 Which of the following is NOT the purpose of reconnaissance (the first phase of an attack after obtaining the permission). Group of answer choices Gather Organization Information Gather Network Information Gather System Information Steal the data Question 5 What is the name of the tool/techniques used in this module to gain access to the remote system? Group of answer choices Wireshark Metasploit Framework Fsociety All of the above Question 6 Which of the following is NOT an attack vector? Group of answer choices Unnecessary open Ports Unpatched services/systems Vulnerabilities Strong passwords Question 7 A reverse shell will set up a listener running on the target/victim machine.
  • 2. Group of answer choices True False Question 8 The external kali VM attempts to launch a reverse shell attack against the Windows Server 2008 in our CCIA network. Which of the following is the correct configuration? Group of answer choices LHOST: 192.168.10.11, RHOST: 192.168.217.3 LHOST: 192.168.10.10, RHOST: 192.168.217.3 LHOST: 192.168.217.3, RHOST: 192.168.10.10 LHOST: 192.168.217.3, RHOST: 192.168.10.11 Question 9 A bind shell can be used when the target machine is behind a NAT network. Group of answer choices True False Question 10 The same exploit module targeting the SAME port can work on different target systems. Group of answer choices True False