Ans: 1. ___ is the first step in ethical hacking. it refers to the process of collecting information
about a target network and its environment.
- daisy chaining
- port scanning
- footprinting
- blue printing
(CEHv9 LAB Mod.02)
Quiz hack value
Ans: 2. ___ is the notion among hackers that something is worth doing or is interesting.
,- hack value
- dare
- reconnaissance
- footprinting
(CEHv9 Textbook Mod.01 PG.9)
Quiz daisy chaining
Ans: 3. ____ involves gaining access to one network and/or computer and then using the same
info. to gain access to multiple networks and computers that contain desirable information.
- daisy chaining
- reconnaissance
- port scanning
- footprinting
(CEHv9 Textbook Mod.01 PG.9)
Quiz doxing
Ans: 4. ___ is the act of publishing personally ID'able info. about an individual collected from
publicly available databases and social media.
- daisy chaining
, - reconnaissance
- port scanning
- footprinting
(CEHv9 Textbook Mod.01 PG.9)
Quiz OS attack
Ans: 5. a(n) __ is a type of system attack where attackers search for vulnerabilities in an OS's
design, install, or config. and exploit them to *gain access to a system*.
- OS attack
- misconfiguration attack
- application-level attack
- shrink-wrap code attack
(CEHv9 Textbook Mod.01 PG.13)
Quiz misconfiguration attack
Ans: 6. a(n) __ is a type of system attack where attacks are made on misconfiguration
vulnerabilities that affect web servers, app. plateforms, databases, networks, or frameworks
that may result in illegal access or possible owning of the system.
- OS attack