Q.1
A _________ can gain access illegally to a system if the system is not properly tested in scanning and gaining access phase.
  • a) security officer
  • b) malicious hacker
  • c) security auditor
  • d) network analyst
Q.2
In which phase, the hackers install backdoors so that his/her ownership with the victim’s system can be retained later?
  • a) Scanning
  • b) Maintaining access
  • c) Maintaining Access
  • d) Gaining access
Q.3
_______ is the tool used for this purpose.
  • a) Powersploit
  • b) Aircrack – ng
  • c) Snort
  • d) Nmap
Q.4
Which of the following hacking tools and techniques hackers’ do not use for maintaining access in a system?
  • a) Rootkits
  • b) Backdoors
  • c) Trojans
  • d) Wireshark
Q.5
In _______ phase, the hackers try to hide their footprints.
  • a) Scanning
  • b) Tracks clearing
  • c) Reconnaissance
  • d) Gaining access
Q.6
Which of them is not a track clearing technique?
  • a) Altering log files
  • b) Tunnelling
  • c) Port Scanning
  • d) Footprint removing
Q.7
__________ is the last phase of ethical hacking process.
  • a) Scanning
  • b) Tracks clearing
  • c) Reconnaissance
  • d) Reporting
Q.8
Which of the following is not a footprint-scanning tool?
  • a) SuperScan
  • b) TcpView
  • c) Maltego
  • d) OWASP Zed
0 h : 0 m : 1 s