1. During a penetration test, you discover an open port on the target
system. Which of the following is the most likely next step?
A. Perform a denial of service attack
B. Conduct a service version check
C. Launch a phishing campaign
D. Deploy a Trojan horse
Answer: B. Conduct a service version check
Rationale: After finding an open port, the next logical step is to
determine the version of the service running. This information can be used
to identify known vulnerabilities.
2. What is the primary goal of footprinting in cybersecurity?
A. To map out the target network's architecture
B. To delete logs and traces of reconnaissance activities
C. To establish a backdoor for future access
D. To disrupt the target's operations
Answer: A. To map out the target network's architecture
Rationale: Footprinting is the process of collecting as much information
as possible about a target system to find opportunities to penetrate it.
3. Which scanning technique is most effective for avoiding detection by
intrusion detection systems (IDS)?
A. Aggressive scanning
B. Stealth scanning
C. UDP scanning
D. ARP scanning
Answer: B. Stealth scanning
Rationale: Stealth scanning techniques, such as SYN scans, are designed
to be less detectable by IDS by not completing the TCP handshake.
4. In the context of ethical hacking, what is the main purpose of using
Trojans?
A. To repair corrupted files
B. To create a secure connection
C. To gain unauthorized access to a system
D. To encrypt data for confidentiality
Answer: C. To gain unauthorized access to a system
Category | exam bundles |
Comments | 0 |
Rating | |
Sales | 0 |