ETHICAL HACKING QUIZ
0 of 94 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 94 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
| Average score |
|
| Your score |
|
| Pos. | Name | Entered on | Points | Result |
|---|---|---|---|---|
| Table is loading | ||||
| No data available | ||||
Which type of threat actor only uses skills and knowledge for defensive purposes?
KING is in the middle of performing a penetration test when her client asks her to also check the security of an additional server. Which of the following documents does she need to submit before performing the additional task?
TCP is a connection-oriented protocol that uses a three-way handshake to establish a connection to a system port. Computer 1 sends a SYN packet to Computer 2. Which packet does Computer 2 send back?
Typically, you think of the username as being the unique identifier behind the scenes, but Windows actually relies on the security identifier (SID). Unlike the username, a SID cannot be used again. When viewing data in the Windows Security Account Manager (SAM), you have located an account ending in -501. Which of the following account types did you find?
Which of the following is considered an out-of-band distribution method for private key encryption?
Which statement best describes a suicide hacker?
Which of the following is a deviation from standard operating security protocols?
What type of scan is used to find system weaknesses such as open ports, access points, and other potential threats?
What port does a DNS zone transfer use?
Which of the following best describes a feature of symmetric encryption?
Miguel has been practicing his hacking skills. He has discovered a vulnerability on a system that he did not have permission to attack. Once Miguel discovered the vulnerability, he anonymously alerted the owner and instructed him how to secure the system. What type of hacker is Miguel in this scenario?
Which type of penetration test is required to ensure an organization is following federal laws and regulations?
You are using an iOS device. You want to scan networks, websites, and ports to find open network devices. Which of the following network mapping tools should you use?
Which of the following ports are used by null sessions on your network?
You work for a company that is implementing symmetric cryptography to process payment applications such as card transactions where personally identifiable information (PII) needs to be protected to prevent identity theft or fraudulent charges. Which of the following algorithm types would be best for transmitting large amounts of data?
Which type of testing is typically done by an internal tester who has full knowledge of the network, computer system, and infrastructure?
The process of analyzing an organization’s security and determining its security holes is known as:
Which of the following defines the security standards for any organization that handles cardholder information for any type of payment card?
Which of the following packet crafting software programs can be used to modify flags and adjust other packet content?
LDAP is an internet protocol for accessing distributed directory services. If this port is open, it indicates that Active Directory or Exchange may be in use. What port does LDAP use?
Which of the following is the number of keys used in asymmetric (public key) encryption?
Threats are usually ranked from high to low. A higher number indicates a dangerous threat. A lower number indicates threats that may be annoyances but aren’t necessarily malicious in nature. What is this high-to-low scale known as?
Which of the following documents details exactly what can be tested during a penetration test?
Michael is performing a penetration test for a hospital. Which federal regulation does Michael need to ensure he follows?
You want a list of all open UDP and TCP ports on your computer. You also want to know which process opened the port, which user created the process, and what time is was created. Which of the following scanning tools should you use?
Shawn, a malicious insider, has obtained physical access to his manager’s computer and wants to listen for incoming connections. He has discovered the computer’s IP address, 192.168.34.91, and he has downloaded netcat. Which of the following netcat commands would he enter on the two computers?
Which of the follow is a characteristic of Elliptic Curve Cryptography (ECC)?
There are five phases in the security intelligence life cycle. During which phase do you gather and process information from your internal sources, such as system and application logs?
After performing a risk assessment, an organization must decide what areas of operation can be included in a penetration test and what areas cannot be included. Which of the following describes the process?
Charles found a song he wrote being used without his permission in a video on YouTube. Which law will help him protect his work?
Which of the following best describes the scan with ACK evasion method?
Hugh, a security consultant, recommended the use of an internal and external DNS to provide an extra layer of security. Which of the following DNS countermeasures is being used?
Which of the following cryptographic algorithms is used in asymmetric encryption?
Which of the following attacks involves modifying the IP packet header and source address to make it look like they are coming from a trusted source?
You are performing a penetration test of a local area network (LAN). Refer to the circled area on the network diagram. network. Which of the following types of penetration tests is being performed?

Which of the following best describes what FISMA does?
Which of the following is a benefit of using a proxy when you find that your scanning attempts are being blocked?
Diana, a penetration tester, executed the following command. Which answer describes what you learn from the information displayed?

Which of the following uses on-the-fly encryption, meaning the data is automatically encrypted immediately before it is saved and decrypted immediately after it is loaded?
Penetration testing is the practice of finding vulnerabilities and risks with the purpose of securing a computer or network. Penetration testing falls under which all-encompassing term?
FABRICE is performing a penetration test on a web server. Miguel was given only the server’s IP address and name. Which of the following best describes the type of penetration test Miguel is performing?
Which of the following best describes what SOX does?
Information transmitted by the remote host can be captured to expose the application type, application version, and even operating system type and version. Which of the following is a technique hackers use to obtain information about the services running on a target system?
After the enumeration stage, you are considering blocking port 389. Your colleague has advised you to use caution when blocking ports that could potentially impact your network.
Which of the following necessary services could be blocked?
Alan wants to implement a security tool that protects the entire contents of a hard drive and prevents access even if the drive is moved to another system. Which of the following tools should he choose?
Heather is performing a penetration test. She has gathered a lot of valuable information about her target already. Heather has used some hacking tools to determine that, on her target network, a computer named Production Workstation has port 445 open. Which step in the ethical hacking methodology is Heather performing?
Which of the following elements is generally considered the weakest link in an organization’s security?
Which of the following is a limitation of relying on regulations?
Joe wants to use a stealthy Linux tool that analyzes network traffic and returns information about operating systems. Which of the following banner grabbing tools is he most likely to use?
Which of the following is the most basic way to counteract SMTP exploitations?
Which of the following encryption tools would prevent a user from reading a file that they did not create and does not require you to encrypt an entire drive?
Which of the following is the third step in the ethical hacking methodology?
Which of the following best describes social engineering?
A technician is using a modem to dial a large block of phone numbers in an attempt to locate other systems connected to a modem. Which type of network scan is being used?
In which phase of the ethical hacking process do you gather information from a system to learn more about its configurations, software, and services?
Which of the following terms is the encrypted form of a message that is unreadable except to its intended recipient?
Donna is configuring the encryption settings on her email server. She is given a choice of encryption protocols and has been instructed to use the protocol that has the most improvements. Which of the following cryptographic protocols should she choose?
FABRICE is performing a penetration test on his client’s web-based application. Which penetration test frameworks should Miguel utilize?
Which of the following is considered a mission-critical application?
A ping sweep is used to scan a range of IP addresses to look for live systems. A ping sweep can also alert a security system, which could result in an alarm being triggered or an attempt being blocked. Which type of scan is being used?
Which enumeration process tries different combinations of usernames and passwords until it finds something that works?
Bob encrypts a message using a key and sends it to Alice. Alice decrypts the message using the same key. Which of the following types of encryption keys is being used?
Which of the following is an open-source cryptography toolkit that implements SSL and TLS network protocols and the related cryptography standards required by them?
The penetration testing life cycle is a common methodology used when performing a penetration test. This methodology is almost identical to the ethical hacking methodology. Which of the following is the key difference between these methodologies?
What does an organization do to identify areas of vulnerability within their network and security systems?
Randy is an ethical hacker student. He has learned how Nmap flag manipulation can help find open ports. Although the name of the operating system did not jump right out at him, he might be able to figure it out by reviewing packet information. In a packet, Randy can see a TTL of 255 and a window size of 4128. What type of scanning process is Randy using?
Which of the following best describes IPsec enumeration?
Which of the following is a characteristic of Triple DES (3DES)?
Which of the following best explains why brute force attacks are always successful?
You are executing an attack in order to simulate an outside attack. Which type of penetration test are you performing?
During a risk assessment, the organization determines that the risk of collecting personal data from its customers is not acceptable and stops. What method of dealing with risk is the organization using?
Which of the following scans is used to actively engage a target in an attempt to gather information about it?
Which of the following enumeration tools provides information about users on a Linux machine?
Which of the following is the most frequently used symmetric key stream cipher?
Which of the following cryptography attacks is characterized by the attacker having access to both the plain text and the resulting ciphertext, but does not allow the attacker to choose the plain text?
Which of the following best describes a gray box penetration test?
he following formula defines which method of dealing with risk?
Cost of Risk > Damage = Risk _________
A hacker finds a target machine but wants to avoid getting caught, so the hacker finds another system to take the blame. This system is frequently called a zombie machine because it’s disposable and creates a good distraction. Which of the following port scans is being used?
The Simple Network Management Protocol (SNMP) is used to manage devices such as routers, hubs, and switches. SNMP works with an SNMP agent and an SNMP management station in which layer of the OSI model?
Which of the following is a characteristic of the Advanced Encryption Standard (AES) symmetric block cipher?
Your company produces an encryption device that lets you enter text and receive encrypted text in response. An attacker obtains one of these devices and starts inputting random plain text to see the resulting ciphertext. Which of the following cryptographic attacks is being used?
Randy was just hired as a penetration tester for the red team. Which of the following best describes the red team?
Which of the following is a consideration when scheduling a penetration test?
FABRICE, a security specialist, is using an Xmas tree scan. Which of the following TCP flags will be sent back if the port is closed?
A hacker has managed to gain access to the /etc/passwd file on a Linux host. What can the hacker obtain from this file?
Which of the following forms of cryptography is best suited for bulk encryption because of its speed?
Which of the following cryptography attacks is characterized by the attacker making a series of interactive queries and choosing subsequent plain texts based on the information from the previous encryption?
The Stuxnet worm was discovered in 2010 and was used to gain sensitive information on Iran’s industrial infrastructure. This worm was probably active for about five years before being discovered. During this time, the attacker had access to the target. Which type of attack was Stuxnet?
A client asking for small deviations from the scope of work is called:
Which of the following flags is used by a TCP scan to direct the sending system to send buffered data?
Jorge, a hacker, has gained access to a Linux system. He has located the usernames and IDs. He wants the hashed passwords for the users that he found. Which file should he look in?
Which of the following is the number of keys used in symmetric encryption?
Which type of cryptanalysis method is based on substitution-permutation networks?
Which type of test simulates an insider threat by giving the tester partial information about the network and computer systems?
WhatsApp us