2023 WGU C701 Ethical Hacking Pre- Assessment Questions and Expert Verified Answers
2023 WGU C701 Ethical Hacking Pre- Assessment Questions and Expert Verified Answers 1. Hacker is a person who illegally breaks into a system or network without any authorization to destroy, steal sensitive data or to perform any malicious attacks. Black hat hackers are: - Individuals with extraordinary computing skills, resorting to malicious or destructive activities and are also known as crackers 2. In order to compromise or to hack a system or network the hackers go through various phases of the hacking. What is the first hacking phase that hackers perform to gather information about a target prior to launching an attack? 3. Defense-in-depth is a security strategy in which several protection layers are placed throughout an information system. It helps to prevent direct attacks against an information system and data because a break in one layer only leads the attacker to the next layer. - True 4. Penetration testing is a method of actively evaluating the security of an information system or network by simulating an attack from a malicious source. Which of the following technique is used to simulate an attack from someone who is unfamiliar with the system? - Reconnaissance - Black box pen testing 5. Which of the following scanning technique attackers use to bypass firewall rules, logging mechanism, and hide themselves as usual network traffic? 6. Which of the following scan only works if operating system’s TCP/IP implementation is based on RFC 793? - NULL scan 8. Proxy is a network computer that can serve as an intermediary for connecting with other computers. Which of the following sentence is true about a proxy? 9. IP spoofing refers to the procedure of an attacker changing his or her IP address so that he or she appears to be someone else. Which of the following IP spoofing detection technique succeed only when the attacker is in a different subnet? 7. OS fingerprinting is the method used to determine the operating system running on a remote target system. It is an important scanning method, as the attacker will have a greater probability of success if he/she knows the OS. Active stack fingerprinting is one of the types of OS fingerprinting. Which of the following is true about active stack fingerprinting? - Is based on the fact that various vendors of OS implement the TCP stack differently - Stealth scanning technique - Protects the local network from outside access - Direct TTL probes technique - Transform domain techniques 10. Enumeration is defined as the process of extracting user names, machine names, network resources, shares, and services from a system. Which of the following enumeration an attacker uses to obtain list of computers that belongs to a domain? 11. Network Time Protocol (NTP) is designed to synchronize clocks of networked computers. Which of the following port NTP uses as its primary means of communication? 12. Rootkits are kernel programs having the ability to hide themselves and cover up traces of activities. It replaces certain operating system calls and utilities with its own modified versions of those routines. Which of the following rootkit modifies the boot sequence of the machine to load themselves instead of the original virtual machine monitor or operating system? - Hypervisor level rootk
Escuela, estudio y materia
- Institución
- C 701
- Grado
- C 701
Información del documento
- Subido en
- 24 de octubre de 2023
- Número de páginas
- 11
- Escrito en
- 2023/2024
- Tipo
- Examen
- Contiene
- Preguntas y respuestas
Temas
-
2023 wgu c701 ethical hacking pre assessment ques