Questions and CORRECT Answers
What is the phases of the Cyber Kill Chain - CORRECT ANSWER- Recon, Weaponization,
Delivery, Exploitation, Install, CNC & Action
Which of the ICMP messages are used by most traceroute programs to determine the IP
addresses of intermediate routers? - CORRECT ANSWER- Type 11
What is the goal of enumeration? - CORRECT ANSWER- To gather as much information
about the network as possible
The type of scan that is when the source address is spoofed to the target but requires a zombie. -
CORRECT ANSWER- Idle Scan
Scan that goes through IP address ranges provided by user - CORRECT ANSWER- Listing
Scan
Unique scan that only works on UNIX and Linux where no is a sign of an open port. -
CORRECT ANSWER- NULL Scan
Which information may be gathered using nslookup? - CORRECT ANSWER- Hostnames
and IP addresses
Adversary behavior Powershell - CORRECT ANSWER- Automation tool to transfer data
Adversary behavior Command line - CORRECT ANSWER- Gain access to read files or
their contents
, Adversary behavior CNC Servers - CORRECT ANSWER- Communicate remotely to the
system
Adversary behavior DNS tunneling - CORRECT ANSWER- Hide malicious traffic
What is the goal of ethical hacking? - CORRECT ANSWER- To detect security flaws before
they are exploited by attackers
What does covering your tracks mean? - CORRECT ANSWER- Concealing Activity
What is the name of a set of software tools that allows an attacker to access a target remotely and
remain hidden. - CORRECT ANSWER- A rootkit
Which of the following attacks is considered hard to detect? - CORRECT ANSWER-
Passive
What standard specifies the requirements for implementing, maintaining, establishing and
continually improving systems. - CORRECT ANSWER- IEC 2701 and 2013
Protects the public and investors with accurate and reliably corporate disclosures. - CORRECT
ANSWER- Sarbanes-Oxley (SOX) Act
Global level privacy and security laws? - CORRECT ANSWER- General Data Protection
Regulation (GDPR)
Two different treaties that guard against copyright infringement. - CORRECT ANSWER-
Digital Millennium Copyright Act
What is Extension walking? - CORRECT ANSWER- Use of Google operators to change the
file types