Thursday , April 25 2024
Breaking News

Ethical Hacking Professional Certification – ITRONIX SOLUTIONS

Ethical Hacking Professional Certification – ITRONIX SOLUTIONS

Get Ethical Hacking Certificate from Itronix Solutions which you can share in the Certifications section of your LinkedIn profile, on printed resumes, CVs, or other documents.

Exam Details :

  • Format: Multiple Choice Question
  • Questions: 10
  • Passing Score: 8/10 or 80%
  • Language: English

Here are the questions and answers :

What is the purpose of a penetration test?

To identify vulnerabilities in a system or network
To exploit vulnerabilities in a system or network
To fix vulnerabilities in a system or network
To steal sensitive information from a system or network

What is SQL injection?

A technique to identify vulnerabilities in a system or network
A technique to exploit vulnerabilities in a system or network
A technique to fix vulnerabilities in a system or network
A technique to steal sensitive information from a system or network

What is a honeypot?

A device used to lure attackers into a trap
A type of malware that spreads through a network
A tool used to test network performance
A device used to monitor network traffic

What is the attack called “evil twin”?

Rogue access point
ARP poisoning
Session hijacking
MAC spoofing

What are the forms of password cracking techniques?

AttackSyllable
AttackBrute Forcing
AttacksHybrid
All of the above

What does the TCP RST command do?

Restores the connection to a previous state
Finishes a TCP connections
Resets the TCP connection
Starts a TCP connection

A packet with all flags set is which type of scan?

Full Open
XMAS
TCP connect
D.Syn scan

An unauthorized individual enters a building following an employee through the employee entrance after the lunch rush. What type of breach has the individual just performed?

AReverse Social Engineering
Tailgating
Piggybacking
Announced

Why would an attacker want to perform a scan on port 137?

To check for file and print sharing on Windows systems
To discover proxy servers on a network
To discover a target system with the NetBIOS null session vulnerability
To locate the FTP service on the target host

If an attacker uses the command SELECT*FROM user WHERE name = ‘x’ AND userid IS NULL; –‘; which type of SQL injection attack is the attacker performing?

End of Line Comment
UNION SQL Injection
Illegal/Logically Incorrect Query
Tautology

GET COMPLETE DETAILS AND APPLY : CLICK HERE

About Clear My Certification

Check Also

Code4 GOVTECH Internships 2024 | AICTE Internships

About COde 4 GOVTECH : Launched in 2022, C4GT is a one-of-its-kind initiative that aims …

Leave a Reply

Your email address will not be published. Required fields are marked *