Ethical Hacking Exam 1 Chapter 1

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Gives proof

A contract is important because it does what?

A security professional who's hired to break into a network to discover vulnerabilities

A penetration tester is which of the following?

Red team

A team that conducts penetration testing can be referred to as what?

Complete knowledge of system / network

A white‐box test method means the tester has which of the following?

False

A written contract isn't necessary when a friend recommends a client.

Black box testing

As a penetration tester, only you and a few key selected individuals from the company will know of the targeted network that will be tested. You also have zero knowledge of your target other than the name and location of the company. What type of assessment is this called?

Legal reasons, regulatory reasons, or to perform an IT audit

Companies may require a penetration test for which of the following reasons?

Contact your local law enforcement agencies.

How can you find out which computer crime laws are applicable in your state?

With no knowledge

How is black‐box testing performed?

White hat

If you have been contracted to perform an attack against a target system, you are what type of hacker?

Hacktivists

The group Anonymous is an example of what?

Passively uncovering weakness / vulnerabilities

Vulnerability research deals with which of the following?

Target of evaluation

What does TOE stand for?

A description of expected behavior

What is a code of ethics?

Receiving a formal written agreement

What is the most important aspect when conducting a penetration test?

Low

What level of knowledge about hacking does a script kiddie have?

EC-Council

What organization offers the CEH certification exam?

A lack of fear of being caught

What separates a suicide hacker from other attackers?

Get permission

What should a pen-tester do prior to initiating a new penetration test?

weakness

Which of the following best describes a vulnerability?

Hacks for political reasons

Which of the following best describes what a hacktivist does?

Hacks without stealth

Which of the following best describes what a suicide hacker does?

Suicide hacker

Which of the following describes a hacker who attacks without regard for being caught or punished?

Hacktivist

Which of the following describes an attacker who goes after a target to draw attention to a cause?

Permission

Which of the following does an ethical hacker require to start evaluating a system?

NIST (National Instof Standards and Technology)

Which of the following organizations provides government-backed standards?

White hat

Which of the following would most likely engage in the pursuit of vulnerability research?

Daisy chaining

Which term best describes the several hacking attacks in sequence.?

Gray hat

Which type of hacker may use their skills for both benign and malicious goals at different times?


Ensembles d'études connexes

nclex -rn chapter 18 growth development and stages of life P238

View Set

Mod 2 Week 6 Quiz Review (Bible)

View Set

Social Psych - Prosocial Behavior

View Set

2-15 License - Chapter 2 (Part 1)

View Set

Checkpoint question for Chapter 22 The Lymphatic System and Immunity

View Set

(8) Recombinant DNA Technology Reading Questions

View Set

PrepU Chapter 47: Lipid-Lowering Agents

View Set

RESEARCH METHODS - psychology unit 4

View Set