1. During a penetration test, you discover an open port on the target system. Which of the following is the most likely next step? A. Perform a denial of service attack B. Conduct a service version check C. Launch a phishing campaign D. Deploy a Trojan horse Answer: B. Conduct a service version check Rationale: After finding an open port, the next logical step is to determine the version of the service running. This information can be used to identify known vulnerabilities. 2. What is the primary goal of footprinting in cybersecurity? A. To map out the target network's architecture B. To delete logs and traces of reconnaissance activities C. To establish a backdoor for future access D. To disrupt the target's operations Answer: A. To map out the target network's architecture Rationale: Footprinting is the process of collecting as much information as possible about a target system to find opportunities to penetrate it. 3. Which scanning technique is most effective for avoiding detection by intrusion detection systems (IDS)? A. Aggressive scanning B. Stealth scanning C. UDP scanning D. ARP scanning Answer: B. Stealth scanning Rationale: Stealth scanning techniques, such as SYN scans, are designed to be less detectable by IDS by not completing the TCP handshake. 4. In the context of ethical hacking, what is the main purpose of using Trojans? A. To repair corrupted files B. To create a secure connection C. To gain unauthorized access to a system D. To encrypt data for confidentiality Answer: C. To gain unauthorized access to a system

No comments found.
Login to post a comment
This item has not received any review yet.
Login to review this item
No Questions / Answers added yet.
Price $15.00
Add To Cart

Buy Now
Category exam bundles
Comments 0
Rating
Sales 0

Buy Our Plan

We have

The latest updated Study Material Bundle with 100% Satisfaction guarantee

Visit Now
{{ userMessage }}
Processing