cyber securite and element set 6

Que.Which of the following comes after scanning phase in ethical hacking?
a. Scanning
b. Maintaining access
c. Reconnaissance
d. Gaining access
Que.In __________ phase the hacker exploits the network or system vulnerabilities.
a. Scanning
b. Maintaining access
c. Reconnaissance
d. Gaining access
Que.Which of the following is not done in gaining access phase?
a. Tunnelling
b. Buffer overflow
c. Session hijacking
d. Password cracking
Que.Which of the below-mentioned penetration testing tool is popularly used in gaining access phase?
a. Maltego
b. NMAP
c. Metasploit
d. Nessus
Que.A _________ can gain access illegally to a system if the system is not properly tested in scanning and gaining access phase.
a. security officer
b. malicious hacker
c. security auditor
d. network analyst
Que.In which phase, the hackers install backdoors so that his/her ownership with the victim’s system can be retained later?
a. Scanning
b. Maintaining access
c. Maintaining Access
d. Gaining access
Que._______ is the tool used for this purpose.
a. Powersploit
b. Aircrack – ng
c. Snort
d. Nmap
Que.Which of the following hacking tools and techniques hackers’ do not use for maintaining access in a system?
a. Rootkits
b. Backdoors
c. Trojans
d. Wireshark
Que.In _______ phase, the hackers try to hide their footprints.
a. Scanning
b. Tracks clearing
c. Reconnaissance
d. Gaining access
Que.Which of them is not a track clearing technique?
a. Altering log files
b. Tunnelling
c. Port Scanning
d. Footprint removing

Get code60