ExamGecko
Question list
Search
Search

Related questions











Question 295 - 312-50v12 discussion

Report
Export

infecting a system with malware and using phishing to gain credentials to a system or web application are examples of which phase of the ethical hacking methodology?

A.
Reconnaissance
Answers
A.
Reconnaissance
B.
Maintaining access
Answers
B.
Maintaining access
C.
Scanning
Answers
C.
Scanning
D.
Gaining access
Answers
D.
Gaining access
Suggested answer: D

Explanation:

This phase having the hacker uses different techniques and tools to realize maximum data from the system. they're –

• Password cracking – Methods like Bruteforce, dictionary attack, rule-based attack, rainbow table are used. Bruteforce is trying all combinations of the password. Dictionary attack is trying an inventory of meaningful words until the password matches. Rainbow table takes the hash value of the password and compares with pre-computed hash values until a match is discovered.

• Password attacks – Passive attacks like wire sniffing, replay attack. Active online attack like Trojans, keyloggers, hash injection, phishing. Offline attacks like pre-computed hash, distributed network and rainbow. Non electronic attack like shoulder surfing, social engineering and dumpster diving.

asked 18/09/2024
PKE Holding AG Leitgeb
33 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first