Study for the Ethical Hacking Essentials Test. Explore interactive flashcards and multiple-choice questions with hints and explanations. Prepare thoroughly and boost your exam readiness!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


During which phase of the cyber kill chain does a hacker collect information on vulnerabilities?

  1. Installation

  2. Reconnaissance

  3. Weaponization

  4. Command and Control

The correct answer is: Reconnaissance

The phase of the cyber kill chain where a hacker collects information on vulnerabilities is during the reconnaissance phase. This initial step is critical as it involves gathering detailed information about the target, including identifying potential weaknesses in systems, networks, and applications. Hackers may utilize various techniques such as scanning for open ports, conducting network mapping, and using social engineering to gather intelligence. This phase is fundamental for the success of subsequent stages in an attack, as a thorough understanding of vulnerabilities allows the hacker to plan a more effective strategy for exploiting those weaknesses. It's about laying the groundwork for the attack by knowing exactly where and how to strike, thus making this phase vital for any cyber attack methodology.