Ethical Hacking Test 1

0%

What is the method for dealing with network security and performance in the cloud?

Correct! Wrong!

Explanation:
Intrusion detection and prevention are two broad words that refer to application security methods that are used to mitigate assaults and prevent future threats.

What form of attack is it when a hacker tries to attack a host over the Internet?

Correct! Wrong!

Explanation:
A remote attack is a hostile operation directed at one or more computers through the internet. The attacker's machine is unaffected by the remote attack. Instead, the attacker will look for weak places in the security software on a computer or network in order to get access to the machine or system.

What are the requirements for installing a hardware keylogger on a target system?

Correct! Wrong!

Explanation:
Physical access is a word used in computer security to describe a person's capacity to physically access a computer system

In the digital signature procedure, what algorithm is used?

Correct! Wrong!

Explanation:
The MD5 message-digest technique, which produces a 128-bit hash value, is cryptographically broken yet nevertheless extensively used. Although MD5 was created with the intention of being used as a cryptographic hash function, it has been discovered to have numerous flaws.

Which firewall evasion approach will connect to a firewalled DMZ network while HTTP traffic and DNS queries pass through?

Correct! Wrong!

Explanation:
A custom DNS server and a special DNS client are included in tcp-over-dns. Through the conventional DNS protocol, the client and server work together to provide a TCP (and now UDP!) tunnel. This software is similar to the now-defunct NSTX DNS Tuneling software.

When a hacker impersonates a legitimate user on a system, what is the term for it?

Correct! Wrong!

Explanation:
An impersonation attack is a type of fraud in which attackers impersonate a known or trusted individual in order to trick an employee into transferring money to a fraudulent account, sharing sensitive information (such as intellectual property, financial data, or payroll information), or revealing login credentials.

On Windows, which utility may be used to accomplish a DNS zone transfer?

Correct! Wrong!

Explanation:
nslookup is the name of a program that allows an Internet server administrator or any computer user to type in a host name (for example, "whatis.com") and get the IP address or DNS record associated with it. The user can also give it a command to perform a reverse DNS lookup and determine the host name for a given IP address.

Hacking for a good cause is referred to as

Correct! Wrong!

Explanation:
When political or social activists utilize computer technology to make a statement in support of one of their causes, this is known as hacktivism. Hacktivism typically targets government or corporate targets, although it can also target any prominent institution, such as religious groups, drug dealers, terrorists, or pedophiles.

For an NDIS tap, the most effective setting is

Correct! Wrong!

The correct answer:
Connect to a span port on a switch

Related Content
Open