Question 111

Which of the following statements regarding ethical hacking is incorrect?
  • Question 112

    An ethical hacker for a large security research firm performs penetration tests, vulnerability tests, and risk assessments. A friend recently started a company and asks the hacker to perform a penetration test and vulnerability assessment of the new company as a favor.
    What should the hacker's next step be before starting work on this job?
  • Question 113

    What attack is used to crack passwords by using a precomputed table of hashed passwords?
  • Question 114

    You are a Penetration Tester and are assigned to scan a server. You need to use a scanning technique wherein the TCP Header is split into many packets so that it becomes difficult to detect what the packets are meant for.
    Which of the below scanning technique will you use?
  • Question 115

    In which of the following cryptography attack methods, the attacker makes a series of interactive queries, choosing subsequent plaintexts based on the information from the previous encryptions?