Download as xlsx, pdf, or txt
Download as xlsx, pdf, or txt
You are on page 1of 2

CA862 ETHICAL HACKING

Question Option1 Option2


1 Ethical Hacking is also known as? Penetration Tesing Pen Testing
Hardware Level Firmware Level
2 What is the most dangerous type of rootkit?
Rootkit Rootkit
3 What port number does HTTPS use? 53 443
The ethical hacker has The ethical hacker is
What is the major difference between an authorization from the just a cracker who is
4
"Ethical Hacker" and a "Cracker" owner of the target. getting paid
5 What is the first phase of Ethical Hacking? Reconnaissance Scanning
6 Where are passwords kept in Linux? /etc/shadow /etc/passwd
Which of the following statements best
7 Security professional Former black hat
describes a white-hat hacker?
8 Hacking for a cause is called? Hacktivism Black hat hacking
Which term best describes a hacker who uses
9 Cracker Ethical hacker
their hacking skills for destructive purposes?
Port, network, and Port, network, and
10 What are the three types of scanning?
vulnerability services
What is the proper sequence of a TCP
11 SYN-PSH-ACK SYN-ACK-FIN
connection?
What is the process of hiding text within an
12 Spyware Encryption
image called?
13 What port number does SMTP use? 20 22
14 Which tool is used to perform Port scanning? nmap netcat

Which nmap command is used TCP Xmas nmap -sT -p -pN nmap -sX -p -pN
15
Tree scan? 172.16.45.129 172.16.45.129
Which scanning technique completes a full
16 TCP connect scan TCP syn scan
three-way handshake
Which command in LINUX is used to
17 chmod chgrp
change the user group of a file?
What is the command to grant all chmod ugo+rwx
18 chmod u=a file_name
permissions on a file to all user? file_name
19 What port number does DNS use? 53 51
How many number of total ports are
20 65533 65536
available on every computer?
HACKING
Option3 Option4 Correct
P Testing All are correct Option4
Kernel Level
Hypervisor Level Rootkit Option4
Rootkit
80 21 Option2
The ethical hacker does not The ethical hacker
use the same techniques or does it strictly for Option1
skills as a cracker financial motives
unlike a cracker.
Exploitation Maintaining Access Option1
/bin/password /bin/shadow Option2
Former gray hat Malicious hacker Option1
Activisim Active hacking Option1

Script kiddie White-hat hacker Option1

Server, client, and


Grey, black, and white hat Option1
network
SYN-SYN-ACK-
SYN-ACK-ACK Option4
ACK

Steganography Keystroke logging Option3


36 25 Option4
ns lookup whois Option1

nmap -sN -p -pN nmap -sU


Option2
172.16.45.129 172.16.45.129

TCP FIN SCAN TCP Null Scan Option1

chmode sudo Option2

chmod ugo+r
chmod ugo=r file_name Option1
file_name
52 55 Option1
65550 62450 Option2

You might also like