🍏🍏Test 2021 IMK PAID CLASS🍏🍏
❤️🔥 Yesterday Test Answers By
@Mr_Robleis❤️🔥 1.) What is the difference between IP address and Mac address?
> Difference between MAC and IP address is that MAC Address is used to ensure the physical address of the computer. It uniquely identifies the devices on a network. While IP addresses are used to uniquely identifies the connection of the network with that device takes part in a network.
❤️🔥 2.) List out some of the common tools used by Ethical hackers?
> Nmap Hacking Tool
Burp Suite Hacking Tool
Netsparker
Acunetix
Metasploit
Aircrack-Ng
Ettercap
John The Ripper
Wireshark
Angry IP Scanner
❤️🔥 3.)What is footprinting in ethical hacking? What is the techniques used for footprinting?
> It Refers to the process of collecting as much as information as possible about the target system to find ways to penetrate into the system. Techniques : DNS Queries, N/W Enumeration, Network Queries, Ping Sweeps, Port Scanning.
❤️🔥 4.)Explain what is DOS (Denial of service) attack? What are the common forms of DOS attack?
> A denial-of-service (DoS) attack aims to obstruct a network or resource by flooding a target with artificial traffic, which restricts user access to the respective service being attacked. Types : Ddos, N/W Targeted Attacks, System Targeted, Teardrop.
❤️🔥 5.) Explain what is SQL injection?
> SQL Injection attacks (or SQLi) alter SQL queries, injecting malicious code by exploiting application vulnerabilities.
❤️🔥 6.) Explain what is Network Sniffing?
> Sniffing is a process of monitoring and capturing all data packets passing through given network. Sniffers are used by network/system administrator to monitor and troubleshoot network traffic. Attackers use sniffers to capture data packets containing sensitive information such as password, account information etc.
❤️🔥 7.) Write Linux command to view text file?
> cat foo.txt or cat /etc/resolv.conf
❤️🔥 8.)Explain what is Burp Suite, what are the tools it consist of?
> Burp Suite is an integrated platform for performing security testing of web applications. Tools : Target, proxy, repeater, scanner, Intruder, sequencer, decoder, comparer etc.
❤️🔥 9.)You are working as an ethical hacker in a company you have to hide your company data, what the methods you will use explain in your own language.
> When a cyberattack occurs, ethical hackers are called in to be digital detectives. In a certain sense, they are like regular police detectives on TV. They have to search computer systems to find ways an intruder might have come in – a digital door or window left unlocked, perhaps.
❤️🔥 10.) Find location and open ports of this ip address 49.33.178.116
> City : Mumbai
Region : Maharashtra (MH)
Postal code : 400070
Country : India (IN)
Continent : Asia (AS)
Coordinates : 19.0748 (lat) / 72.8856 (long)
Starting Nmap 7.40 (
https://nmap.org ) at 2021-10-22 16:14 UTC
Nmap scan report for 49.33.178.116
Host is up.
PORT STATE SERVICE
21/tcp filtered ftp
22/tcp filtered ssh
23/tcp filtered telnet
80/tcp filtered http
110/tcp filtered pop3
143/tcp filtered imap
443/tcp filtered https
3389/tcp filtered ms-wbt-server
Nmap done: 1 IP address (1 host up) scanned in 3.15 seconds
❤️🔥Regards>
@CIDHUB**