Ethical Hacking Exam 1 Chapter 1
Gives proof
A contract is important because it does what?
A security professional who's hired to break into a network to discover vulnerabilities
A penetration tester is which of the following?
Red team
A team that conducts penetration testing can be referred to as what?
Complete knowledge of system / network
A white‐box test method means the tester has which of the following?
False
A written contract isn't necessary when a friend recommends a client.
Black box testing
As a penetration tester, only you and a few key selected individuals from the company will know of the targeted network that will be tested. You also have zero knowledge of your target other than the name and location of the company. What type of assessment is this called?
Legal reasons, regulatory reasons, or to perform an IT audit
Companies may require a penetration test for which of the following reasons?
Contact your local law enforcement agencies.
How can you find out which computer crime laws are applicable in your state?
With no knowledge
How is black‐box testing performed?
White hat
If you have been contracted to perform an attack against a target system, you are what type of hacker?
Hacktivists
The group Anonymous is an example of what?
Passively uncovering weakness / vulnerabilities
Vulnerability research deals with which of the following?
Target of evaluation
What does TOE stand for?
A description of expected behavior
What is a code of ethics?
Receiving a formal written agreement
What is the most important aspect when conducting a penetration test?
Low
What level of knowledge about hacking does a script kiddie have?
EC-Council
What organization offers the CEH certification exam?
A lack of fear of being caught
What separates a suicide hacker from other attackers?
Get permission
What should a pen-tester do prior to initiating a new penetration test?
weakness
Which of the following best describes a vulnerability?
Hacks for political reasons
Which of the following best describes what a hacktivist does?
Hacks without stealth
Which of the following best describes what a suicide hacker does?
Suicide hacker
Which of the following describes a hacker who attacks without regard for being caught or punished?
Hacktivist
Which of the following describes an attacker who goes after a target to draw attention to a cause?
Permission
Which of the following does an ethical hacker require to start evaluating a system?
NIST (National Instof Standards and Technology)
Which of the following organizations provides government-backed standards?
White hat
Which of the following would most likely engage in the pursuit of vulnerability research?
Daisy chaining
Which term best describes the several hacking attacks in sequence.?
Gray hat
Which type of hacker may use their skills for both benign and malicious goals at different times?