WGU C701: Ethical Hacking – Pre-Assessment Questions
1. Hacker is a person who illegally breaks into a system or network without any authorization to
destroy, steal sensitive data or to perform any malicious attacks.
Black hat hackers are:
- Individuals with extraordinary computing skills, resorting to malicious or destructive activities
and are also known as crackers
2. In order to compromise or to hack a system or network the hackers go through various phases
of the hacking.
What is the first hacking phase that hackers perform to gather information about a target prior to
launching an attack?
- Reconnaissance
3. Defense-in-depth is a security strategy in which several protection layers are placed
throughout an information system. It helps to prevent direct attacks against an information
system and data because a break in one layer only leads the attacker to the next layer.
- True
4. Penetration testing is a method of actively evaluating the security of an information system or
network by simulating an attack from a malicious source.
Which of the following technique is used to simulate an attack from someone who is unfamiliar
with the system?
- Black box pen testing
, 5. Which of the following scanning technique attackers use to bypass firewall rules, logging
mechanism, and hide themselves as usual network traffic?
- Stealth scanning technique
6. Which of the following scan only works if operating system’s TCP/IP implementation is based
on RFC 793?
- NULL scan
7. OS fingerprinting is the method used to determine the operating system running on a remote
target system. It is an important scanning method, as the attacker will have a greater probability
of success if he/she knows the OS. Active stack fingerprinting is one of the types of OS
fingerprinting.
Which of the following is true about active stack fingerprinting?
- Is based on the fact that various vendors of OS implement the TCP stack differently
8. Proxy is a network computer that can serve as an intermediary for connecting with other
computers.
Which of the following sentence is true about a proxy?
- Protects the local network from outside access
9. IP spoofing refers to the procedure of an attacker changing his or her IP address so that he or
she appears to be someone else.
Which of the following IP spoofing detection technique succeed only when the attacker is in a
different subnet?
- Direct TTL probes technique
1. Hacker is a person who illegally breaks into a system or network without any authorization to
destroy, steal sensitive data or to perform any malicious attacks.
Black hat hackers are:
- Individuals with extraordinary computing skills, resorting to malicious or destructive activities
and are also known as crackers
2. In order to compromise or to hack a system or network the hackers go through various phases
of the hacking.
What is the first hacking phase that hackers perform to gather information about a target prior to
launching an attack?
- Reconnaissance
3. Defense-in-depth is a security strategy in which several protection layers are placed
throughout an information system. It helps to prevent direct attacks against an information
system and data because a break in one layer only leads the attacker to the next layer.
- True
4. Penetration testing is a method of actively evaluating the security of an information system or
network by simulating an attack from a malicious source.
Which of the following technique is used to simulate an attack from someone who is unfamiliar
with the system?
- Black box pen testing
, 5. Which of the following scanning technique attackers use to bypass firewall rules, logging
mechanism, and hide themselves as usual network traffic?
- Stealth scanning technique
6. Which of the following scan only works if operating system’s TCP/IP implementation is based
on RFC 793?
- NULL scan
7. OS fingerprinting is the method used to determine the operating system running on a remote
target system. It is an important scanning method, as the attacker will have a greater probability
of success if he/she knows the OS. Active stack fingerprinting is one of the types of OS
fingerprinting.
Which of the following is true about active stack fingerprinting?
- Is based on the fact that various vendors of OS implement the TCP stack differently
8. Proxy is a network computer that can serve as an intermediary for connecting with other
computers.
Which of the following sentence is true about a proxy?
- Protects the local network from outside access
9. IP spoofing refers to the procedure of an attacker changing his or her IP address so that he or
she appears to be someone else.
Which of the following IP spoofing detection technique succeed only when the attacker is in a
different subnet?
- Direct TTL probes technique