Ethical Hacking

Ethical Hacking Test 2

0%

What is the name of the technique for hiding text within an image?

Correct! Wrong!

Explanation:
Steganography is the art of concealing a secret message within (or even on top of) a non-secret object. That something can be anything you want it to be. Many forms of steganography nowadays involve hiding a secret piece of text within a photograph.

Which of the following is a buffer overflow countermeasure?

Correct! Wrong!

Explanation:
Buffer overflow attacks can be mitigated by performing bounds checks.

Which of the following methods of preventing social engineering attacks is the most cost-effective?

Correct! Wrong!

Explanation:
End user training is the most effective strategy to prevent social engineering assaults. Employees must be taught how to react in specific scenarios. They won't be taken off guard this way. Users should also be taught how to spot suspicious conduct.

Which command displays the IP packet's path from a Cisco router to a host?

Correct! Wrong!

Explanation:
Traceroute is a network diagnostic tool that tracks a packet's travel from source to destination on an IP network in real time, revealing the IP addresses of all the routers it pings along the way.

The implementation is known as _______ if DNS servers are located in the DMZ and on the intranet.

Correct! Wrong!

Explanation:
split DNS is the ability of a Domain Name System (DNS) implementation to deliver various sets of DNS information, which is normally determined by the DNS request's originating address. This facility may be able to provide a security and privacy method.

Which TCP and UDP ports would you block at the firewall to prevent a hacker from hijacking an SMB session?

Correct! Wrong!

Explanation:
Block the ports 139 and 445, which are utilized by NetBIOS null sessions, by blocking these ports.

Consider the following scenario: You are an attacker who has successfully compromised your victim by exploiting a service that was supposed to be deactivated. You were able to easily exploit flaws in the service. What could be the problem in this situation?

Correct! Wrong!

Explanation:
A "honeypot" attack is a type of AP impersonation attack in which an attacker from outside the building puts up an AP with the same BSSID and ESSID as a legitimate AP and tries to entice enterprise customers to connect to it.

It's critical to conduct a slow network scan of your target.

Correct! Wrong!

The correct answer:
To avoid alerting the IDS

Under _______ scan the ports that have been scanned the most.

Correct! Wrong!

Explanation:
Scan for TCP SYN (Stealth) (-sS) For good reason, SYN scan is the default and most popular scan option. It can be done quickly, with thousands of ports being scanned per second on a fast network with no obtrusive firewalls. It is the default TCP scan when raw-packet privileges are available, and it requires raw-packet privileges.