Ethical Hacking Professional Certification – ITRONIX SOLUTIONS
Get Ethical Hacking Certificate from Itronix Solutions which you can share in the Certifications section of your LinkedIn profile, on printed resumes, CVs, or other documents.
Exam Details :
- Format: Multiple Choice Question
- Questions: 10
- Passing Score: 8/10 or 80%
- Language: English
Here are the questions and answers :
What is the purpose of a penetration test?
To identify vulnerabilities in a system or network
To exploit vulnerabilities in a system or network
To fix vulnerabilities in a system or network
To steal sensitive information from a system or network
What is SQL injection?
A technique to identify vulnerabilities in a system or network
A technique to exploit vulnerabilities in a system or network
A technique to fix vulnerabilities in a system or network
A technique to steal sensitive information from a system or network
What is a honeypot?
A device used to lure attackers into a trap
A type of malware that spreads through a network
A tool used to test network performance
A device used to monitor network traffic
What is the attack called “evil twin”?
Rogue access point
ARP poisoning
Session hijacking
MAC spoofing
What are the forms of password cracking techniques?
AttackSyllable
AttackBrute Forcing
AttacksHybrid
All of the above
What does the TCP RST command do?
Restores the connection to a previous state
Finishes a TCP connections
Resets the TCP connection
Starts a TCP connection
A packet with all flags set is which type of scan?
Full Open
XMAS
TCP connect
D.Syn scan
An unauthorized individual enters a building following an employee through the employee entrance after the lunch rush. What type of breach has the individual just performed?
AReverse Social Engineering
Tailgating
Piggybacking
Announced
Why would an attacker want to perform a scan on port 137?
To check for file and print sharing on Windows systems
To discover proxy servers on a network
To discover a target system with the NetBIOS null session vulnerability
To locate the FTP service on the target host
If an attacker uses the command SELECT*FROM user WHERE name = ‘x’ AND userid IS NULL; –‘; which type of SQL injection attack is the attacker performing?
End of Line Comment
UNION SQL Injection
Illegal/Logically Incorrect Query
Tautology