Preview

Hacking

Good Essays
Open Document
Open Document
681 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hacking
Chapter 1, lab 1 assessment questions

1. List the five steps of the hacking process.
Ans:
Foot printing
Scanning and Enumeration
System Hacking
Deploy Payload cover tracks
2. In order to exploit or attack the targeted systems, what can you do as an initial first step to collect as much information as possible about the targets prior devising an attack and penetration test plan?
Ans: Reconnaissance
3. What application and tools can be used to perform this initial reconnaissance and probing step?
Ans: Google hacking site

4. How can social engineering be sued to gather information or data about the organizations IT infrastructure?
Ans: social engineering is a type of information gathering, social engieneering can include, impersonation of someone over the phone, sending emails or IM chats asking for information, phishing can be used to gather information that can be used to gain access to secure systems or information.

5. What does the Enumeration step of the five step hacking process entail and how is it vital to the hacker’s objective?
Ans: this portion of an attack involves actual interaction with the target, the attack is getting information back from the target at this point, it is vital because the target is returning information such as usernames group and share names. This information is useful because the attacker now know what kind of information they can extract and if it is valuable or not.

6. Explain how an attacker will avoid being detected following a successful penetration attack?
Ans: cover their tracks buy purging the attack system to destroy evidence of the crime

7. What method does an attacker use to regain access to an already penetrated system?
Ans: planting a backdoor will allow a hacker to regain access to an already hacked system for later use if needed.

8. As a security professional, you have been asked to perform an intrusive penetration test which involves cracking into the organization’s WLAN for

You May Also Find These Documents Helpful

  • Satisfactory Essays

    This is when the hacker places a back door that could be done by installing a program that can give the hacker unlimited access to the database anytime which could compromise any important data such as customer personal information or even company information.…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    * Designed to remain undetected in order to gather information over prolonged periods. This type of attack has been observed in other large-scale data breaches that caused large numbers of identities to be exposed…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    21.) What do you call an attempted hacking, where every possible every possible combination is used?…

    • 641 Words
    • 3 Pages
    Good Essays
  • Good Essays

    ISSC362 Week 2 Lab

    • 454 Words
    • 2 Pages

    Vulnerability MS08-067 is an exposure in Server Service that could allow remote code execution in an affected system. The operating systems affected are Microsoft Windows 2000, Windows XP, and Windows Server 2003.…

    • 454 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Unit 1 Assignment Q A

    • 592 Words
    • 2 Pages

    3). What application and tools can be use to perform this initial reconnaissance and probing step?…

    • 592 Words
    • 2 Pages
    Good Essays
  • Better Essays

    [Company] has been contracted to conduct a penetration test against [Organization] external web presence. The…

    • 1355 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Lab 1

    • 567 Words
    • 3 Pages

    3. What applications and tools can be used to perform this initial reconnaissance and probing step?…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Final Exam

    • 393 Words
    • 2 Pages

    The Motives Behind Hacking: Vandalism, Public Interest, Reveal Wrongdoing, Financial Gain, As a Protest, The Challenge (fun).…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Chapter 2 Assessment

    • 264 Words
    • 1 Page

    12) Which of the following best describes the term “attack surface”? B) All possible vulnerabilities that could be exploited.…

    • 264 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    Unauthorized access to data centers, computer rooms and wiring closets, servers must be shut down occasionally for maintenance causing network downtime, data can be easily lost or corrupt and recovering critical business functions may take too long to be useful.…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    11. To show what an attacker would have access to if they were in the system.…

    • 263 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    Develop incident response procedures Develop and write down how to respond to incidents. Investigate incidents Responding to incidents and fulfilling all requirements as outlined in the response procedures. Protect collected evidence Collect, store, and keep a chain of custody for any/all evidence collected during the investigation…

    • 531 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    In my opinion, both narrators are unreliable. Although both narrators are unreliable, I believe that the narrator in "The Black Cat" is is a little more reliable. It's hard to say that one narrator is more reliable when they both have very similar characteristics. Both narrators are delusional and have personal issues. As I read "The Tell-Tale Heart," I learned that the narrator had no friends, he was paranoid, and he probably didn't know the difference between real and unreal. There is no doubt that the narrator in "The Black Cat" has anger management issues. These anger issues led to the murder in a short story. The main reason that I chose the narrator in "The Black Cat" to be more reliable was because I knew more about him. Meanwhile,…

    • 224 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    One of Collins’ main goals when teaching Romeo and Juliet, which he expresses early in the article, is for his students to gain confidence in their ability to read and interpret plays. He quickly realized that many of his college students shared the misconception that Shakespeare intended to idealize the lovers’ decision to take their lives for each other. To draw his students away from this idea, Collins tries to get them to consider Romeo’s extreme readiness for death. Juliet, like most people, views death as the only option remaining, whereas Romeo, throughout the play, continually proclaims that he will die for her. This shockingly different view of the play sparked interest among his students. He then asks his students to consider if the…

    • 380 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Safe Guarding 333

    • 2213 Words
    • 8 Pages

    Gather information to determine whether a criminal investigation should take place or immediate action is required.…

    • 2213 Words
    • 8 Pages
    Good Essays

Related Topics