0 of 15 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 15 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
1. _____________ phase is also referred to as the footprinting & the information gathering phase.
2. In ___________ scanning, hackers scan the target for weaknesses.
3. In _____________ extraction step, hackers collect particular information about ports, live machines and OS details.
4. In the ______________ phase of hacking, the hacker designs the network map to decide how to carry out the attack.
5. The goal of the _____________ phase is to keep their access to the target until the tasks they planned to accomplish in the target are finished.
6. Clearing the cache and cookies, Modifying registry values, and Uninstalling all scripts or applications belongs to the _______________ phase of hacking.
7. _______________ means gathering information about a target system that can be used to execute a successful cyber attack.
8. ___________ footprinting means performing footprinting by getting in direct touch with the target machine.
9. ______________ footprinting means collecting information about a system located at a remote distance from the attacker.
10. In ______________, the attacker tries to record the personal conversation of the target victim with someone that’s being held over communication mediums like the Telephone.
11. In __________, the attacker tries to catch the personal information of the victim by looking over the victim’s shoulder while the same is entering his/her personal details.
12. The _____________ is a website that collects snapshots of all the websites at a regular interval of time.
13. ____________ queries the specified DNS server and retrieves the requested records that are associated with the domain name you provided.
14. The ping command is used to show the ______________ of the website.
15. Google ___________ is also known as Google hacking.