
Ethical Hacking
Authored by Avinash Borse
Computers
Professional Development
Used 19+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
50 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Maintaining access
Gaining access
Reconnaissance
Scanning
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How many phases are there in hacking?
4
5
7
6
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
____________ is the information gathering phase in ethical hacking from the target user.
Reconnaissance
Scanning
Gaining access
Maintaining access
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is not a reconnaissance tool or technique for information gathering?
NMAP
Hping
whois lookup
Nexpose
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
There are ______ subtypes of reconnaissance.
2
3
4
5
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is an example of active reconnaissance?
Searching public records
Telephone calls as a help desk or fake customer care person
Looking for the target’s details in the database
Searching the target’s details in paper files
7.
MULTIPLE CHOICE QUESTION
45 sec • 1 pt
________________ is a component of the reconnaissance stage that is used to gather possible information for a target computer system or network.
Fingerprinting
3D printing
Footprinting
Data printing
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?