Prepare for your Ethical Hacking Essentials Test. Study with flashcards and multiple choice questions with detailed hints and explanations. Enhance your cybersecurity skills and get ready for your exam!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


During which phase of the cyber kill chain does a hacker collect information on vulnerabilities?

  1. Installation

  2. Reconnaissance

  3. Weaponization

  4. Command and Control

The correct answer is: Reconnaissance

The phase of the cyber kill chain where a hacker collects information on vulnerabilities is during the reconnaissance phase. This initial step is critical as it involves gathering detailed information about the target, including identifying potential weaknesses in systems, networks, and applications. Hackers may utilize various techniques such as scanning for open ports, conducting network mapping, and using social engineering to gather intelligence. This phase is fundamental for the success of subsequent stages in an attack, as a thorough understanding of vulnerabilities allows the hacker to plan a more effective strategy for exploiting those weaknesses. It's about laying the groundwork for the attack by knowing exactly where and how to strike, thus making this phase vital for any cyber attack methodology.