Question 111
Which of the following statements regarding ethical hacking is incorrect?
Question 112
An ethical hacker for a large security research firm performs penetration tests, vulnerability tests, and risk assessments. A friend recently started a company and asks the hacker to perform a penetration test and vulnerability assessment of the new company as a favor.
What should the hacker's next step be before starting work on this job?
What should the hacker's next step be before starting work on this job?
Question 113
What attack is used to crack passwords by using a precomputed table of hashed passwords?
Question 114
You are a Penetration Tester and are assigned to scan a server. You need to use a scanning technique wherein the TCP Header is split into many packets so that it becomes difficult to detect what the packets are meant for.
Which of the below scanning technique will you use?
Which of the below scanning technique will you use?
Question 115
In which of the following cryptography attack methods, the attacker makes a series of interactive queries, choosing subsequent plaintexts based on the information from the previous encryptions?
