Sessional 1
Sessional 1
• A. Black hat
• B. White hat
• C. Gray hat
• D. Red hat
1. If you have been contracted to perform an attack against a target system,
you are what type of hacker?
• A) White hat
• B) Gray hat
• C) Black hat
• D) Red hat
2. Which of the following describes an attacker who goes after a target to draw
attention to a cause?
• A) Terrorist
• B) Criminal
• C) Hacktivist
• D) Script kiddie
6. Which of the following describes a hacker who attacks without regard for
being caught or punished?
• A) Hacktivist
• B) Terrorist
• C) Criminal
• D) Suicide hacker
12. Which of the following best describes what a suicide hacker does?
• A) Hacks with permission
• B) Hacks without stealth
• C) Hacks without permission
• D) Hacks with stealth
13. Which type of hacker may use their skills for both benign and malicious
goals at different times?
• A) White hat
• B) Gray hat
• C) Black hat
• D) Suicide hacker
15. Which of the following would most likely engage in the pursuit of
vulnerability research?
• A) White hat
• B) Gray hat
• C) Black hat
• D) Suicide hacker
a) Fuzz testing
b) Penetration testing
c) Vulnerability scanning
d) Source code review
A) Eavesdropping
B) Session hijacking
C) Spoofing
D) Privilege escalation
A) Integrity
B) Availability
C) Confidentiality
D) Non-repudiation
3. Which type of information warfare involves sensor-based technology
that directly disrupts technological systems?
A) Intelligence-based warfare
B) Economic warfare
C) Electronic warfare
D) Command-and-control warfare (C2 warfare)
A) Delivery
B) Reconnaissance
C) Weaponization
D) Installation
A) Suicide hackers
B) White hats
C) Hacktivists
D) Script kiddies
A) Cyberwarfare
B) Intelligence-based warfare
C) Economic warfare
D) Command-and-control warfare
7. Sam, an attacker, was hired to disrupt an organization’s operations and
gain access to its remote system. During the attack, Sam tampered with
data in transit to break into the organization’s network. What type of
attack did Sam perform?
A) Insider attack
B) Passive attack
C) Active attack
D) Distribution attack
A) Intelligence-based warfare
B) Economic warfare
C) Electronic warfare
D) Command-and-control warfare (C2 warfare)
In which phase of the cyber kill chain does the attacker’s malicious code
exploit a vulnerability in the operating system, application, or server on a
target system?
At this stage, the organization may face threats such as authentication and
authorization attacks, arbitrary code execution, phishing, security threats, and
security misconfiguration.
A) Weaponization
B) Exploitation
C) Reconnaissance
D) Installation
• A. [inurl:]
• B. [info:]
• C. [site:]
• D. [related:]
You are a penetration tester working to test the user awareness of the
employees of the client XYZ. You harvested two employees’ emails from
some public sources and are creating a client-side backdoor to send it to the
employees via email.
Which stage of the cyber kill chain are you at?
• A. Reconnaissance
• B. Weaponization
• C. Command and control
• D. Exploitation
1. Which of the following best describes footprinting?
• A) Enumeration of services
• B) Discovery of services
• C) Discussion with people
• D) Investigation of a target
7. Which of the following can an attacker use to determine the technology and
structure within an organization?
• A) Job boards
• B) Archives
• C) Google hacking
• D) Social engineering
9. Which of the following can help you determine business processes of your
target through human interaction?
• A) Social engineering
• B) Email
• C) Website
• D) Job boards
11. Which record will reveal information about a mail server for a domain?
• A) A
• B) Q
• C) MS
• D) MX
13. What can be configured in most search engines to monitor and alert you of
changes to content?
• A) Notifications
• B) Schedules
• C) Alerts
• D) HTTP
a) SQL injection
b) Cross-site scripting
c) Phishing
d) Buffer overflow
A) Nmap
B) tcpdump
C) tracert
D) ping
a) Pretexting
b) Phishing
c) Shoulder surfing
d) SQL injection
Which of the following is an example of a passive network reconnaissance
technique?
a) Port scanning
b) Ping sweep
c) Banner grabbing
d) Sniffing
NETWORK SCANNING
What is the main purpose of a port scanner?
11. A full-open scan means that the three-way handshake has been completed.
What is the difference between this and a half-open scan?
• A) A half-open uses TCP.
• B) A half-open uses UDP.
• C) A half-open does not include the final ACK.
• D) A half-open includes the final ACK.
12. What is the sequence of the three-way handshake?
• A) SYN, SYN-ACK, ACK
• B) SYN, SYN-ACK
• C) SYN, ACK, SYN-ACK
• D) SYN, ACK, ACK
What is the way to decide how a packet will move from an untrusted outside
host to a protected inside that is behind a firewall, which permits the hacker
to determine which ports are open and if the packets can pass through the
packet-filtering of the firewall?
A. Session hijacking
B. Firewalking
C. Man-in-the middle attack
D. Network sniffing