100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

2023 WGU C701 Ethical Hacking Pre- Assessment Questions and Expert Verified Answers

Rating
-
Sold
-
Pages
11
Grade
A+
Uploaded on
24-10-2023
Written in
2023/2024

2023 WGU C701 Ethical Hacking Pre- Assessment Questions and Expert Verified Answers 1. Hacker is a person who illegally breaks into a system or network without any authorization to destroy, steal sensitive data or to perform any malicious attacks. Black hat hackers are: - Individuals with extraordinary computing skills, resorting to malicious or destructive activities and are also known as crackers 2. In order to compromise or to hack a system or network the hackers go through various phases of the hacking. What is the first hacking phase that hackers perform to gather information about a target prior to launching an attack? 3. Defense-in-depth is a security strategy in which several protection layers are placed throughout an information system. It helps to prevent direct attacks against an information system and data because a break in one layer only leads the attacker to the next layer. - True 4. Penetration testing is a method of actively evaluating the security of an information system or network by simulating an attack from a malicious source. Which of the following technique is used to simulate an attack from someone who is unfamiliar with the system? - Reconnaissance - Black box pen testing 5. Which of the following scanning technique attackers use to bypass firewall rules, logging mechanism, and hide themselves as usual network traffic? 6. Which of the following scan only works if operating system’s TCP/IP implementation is based on RFC 793? - NULL scan 8. Proxy is a network computer that can serve as an intermediary for connecting with other computers. Which of the following sentence is true about a proxy? 9. IP spoofing refers to the procedure of an attacker changing his or her IP address so that he or she appears to be someone else. Which of the following IP spoofing detection technique succeed only when the attacker is in a different subnet? 7. OS fingerprinting is the method used to determine the operating system running on a remote target system. It is an important scanning method, as the attacker will have a greater probability of success if he/she knows the OS. Active stack fingerprinting is one of the types of OS fingerprinting. Which of the following is true about active stack fingerprinting? - Is based on the fact that various vendors of OS implement the TCP stack differently - Stealth scanning technique - Protects the local network from outside access - Direct TTL probes technique - Transform domain techniques 10. Enumeration is defined as the process of extracting user names, machine names, network resources, shares, and services from a system. Which of the following enumeration an attacker uses to obtain list of computers that belongs to a domain? 11. Network Time Protocol (NTP) is designed to synchronize clocks of networked computers. Which of the following port NTP uses as its primary means of communication? 12. Rootkits are kernel programs having the ability to hide themselves and cover up traces of activities. It replaces certain operating system calls and utilities with its own modified versions of those routines. Which of the following rootkit modifies the boot sequence of the machine to load themselves instead of the original virtual machine monitor or operating system? - Hypervisor level rootk

Show more Read less
Institution
C 701
Course
C 701









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
C 701
Course
C 701

Document information

Uploaded on
October 24, 2023
Number of pages
11
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
NurseTestBanks Johns Hopkins University
View profile
Follow You need to be logged in order to follow users or courses
Sold
586
Member since
2 year
Number of followers
59
Documents
1303
Last sold
16 hours ago
NurseTestBanks - Test Banks & Practice Exams Graded A+

Welcome to NurseTestBanks, your go-to destination for reliable and comprehensive nursing exam resources. We know that nursing school can be intense and challenging, but the right study tools can make a big difference. At NurseTestBanks, we offer expertly crafted test banks and study guides tailored to help you grasp key concepts, prepare with confidence, and perform your best on exams. Let us help you turn stress into success with study materials that truly support your nursing education. Don't stress. Just do your best, and everything is gonna be alright. Good Luck!!

Read more Read less
4.9

345 reviews

5
320
4
15
3
4
2
1
1
5

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions