Ethical Hacking Professional Certification – ITRONIX SOLUTIONS
Get Ethical Hacking Certificate from Itronix Solutions which you can share in the Certifications section of your LinkedIn profile, on printed resumes, CVs, or other documents.
Exam Details:
- Format: Multiple Choice Question
- Questions: 10
- Passing Score: 8/10 or 80%
- Language: English
Here are the Questions and Answers:
Question 1: What is the purpose of a penetration test?
- To identify vulnerabilities in a system or network
- To exploit vulnerabilities in a system or network
- To fix vulnerabilities in a system or network
- To steal sensitive information from a system or network
Question 2: What is SQL injection?
- A technique to identify vulnerabilities in a system or network
- A technique to exploit vulnerabilities in a system or network
- A technique to fix vulnerabilities in a system or network
- A technique to steal sensitive information from a system or network
Question 3: What is a honeypot?
- A device used to lure attackers into a trap
- A type of malware that spreads through a network
- A tool used to test network performance
- A device used to monitor network traffic
Question 4: What is the attack called “evil twin”?
- Rogue access point
- ARP poisoning
- Session hijacking
- MAC spoofing
Question 5: What are the forms of password cracking techniques?
- AttackSyllable
- AttackBrute Forcing
- AttacksHybrid
- All of the above
Question 6: What does the TCP RST command do?
- Restores the connection to a previous state
- Finishes a TCP connections
- Resets the TCP connection
- Starts a TCP connection
Question 7: A packet with all flags set is which type of scan?
- Full Open
- XMAS
- TCP connect
- D.Syn scan
Question 8: An unauthorized individual enters a building following an employee through the employee entrance after the lunch rush. What type of breach has the individual just performed?
- AReverse Social Engineering
- Tailgating
- Piggybacking
- Announced
Question 9: Why would an attacker want to perform a scan on port 137?
- To check for file and print sharing on Windows systems
- To discover proxy servers on a network
- To discover a target system with the NetBIOS null session vulnerability
- To locate the FTP service on the target host
Question 10: If an attacker uses the command SELECT*FROM user WHERE name = ‘x’ AND userid IS NULL; –‘; which type of SQL injection attack is the attacker performing?
- End of Line Comment
- UNION SQL Injection
- Illegal/Logically Incorrect Query
- Tautology