Ethical Hacking Pro - Questions

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

You are executing an attack in order to simulate an outside attack. Which type of penetration test are you performing?

Black box

The process of analyzing an organization's security and determining its security holes is known as:

Threat modeling

The following formula defines which method of dealing with risk? Cost of Risk > Damage = Risk _________

Acceptance

The Stuxnet worm was discovered in 2010 and was used to gain sensitive information on Iran's industrial infrastructure. This worm was probably active for about five years before being discovered. During this time, the attacker had access to the target. Which type of attack was Stuxnet?

Advanced Persistent Threat (APT)

During a risk assessment, the organization determines that the risk of collecting personal data from its customers is not acceptable and stops. What method of dealing with risk is the organization using?

Avoidance

Heather is in the middle of performing a penetration test when her client asks her to also check the security of an additional server. Which of the following documents does she need to submit before performing the additional task? * Rules of engagement * Permission to test * Scope of work * Change order

Change order

Penetration testing is the practice of finding vulnerabilities and risks with the purpose of securing a computer or network. Penetration testing falls under which all-encompassing term?

Ethical Hacking

Miguel is performing a penetration test on a web server. Miguel was given only the server's IP address and name. Which of the following best describes the type of penetration test Miguel is performing? * Internal * Black box * External * White box

External

What is the third step in the ethical hacking methodology?

Gain access

Miguel has been practicing his hacking skills. He has discovered a vulnerability on a system that he did not have permission to attack. Once Miguel discovered the vulnerability, he anonymously alerted the owner and instructed him how to secure the system. What type of hacker is Miguel in this scenario?

Gray hat

Which of the following elements is generally considered the weakest link in an organization's security? * Human * Servers * Network * Physical

Human

You are performing a penetration test of a local area network (LAN). Refer to the circled area on the network diagram. network. Which of the following types of penetration tests is being performed? *LAN >> FIREWALL>>WAN * Internal * External * Gray Box * Black Box

Internal

Which of the following is considered a mission-critical application? * Support log * Customer database * Medical database * Video player

Medical database

Miguel is performing a penetration test on his client's web-based application. Which penetration test frameworks should Miguel utilize?

OWASP

Randy was just hired as a penetration tester for the red team. Which of the following best describes the red team? * Acts as a pipeline between teams and can work on any side. * Is responsible for establishing and implementing policies. * Is a team of specialists that focus on the organization's defensive security. * Performs offensive security tasks to test the network's security

Performs offensive security tasks to test the network's security.

The penetration testing life cycle is a common methodology used when performing a penetration test. This methodology is almost identical to the ethical hacking methodology. What is the key difference between these methodologies?

Reporting

What does an organization do to identify areas of vulnerability within their network and security systems?

Risk assessment

Heather is performing a penetration test. She has gathered a lot of valuable information about her target already. Heather has used some hacking tools to determine that, on her target network, a computer named Production Workstation has port 445 open. Which step in the ethical hacking methodology is Heather performing?

Scanning and enumeration

A client asking for small deviations from the scope of work is called:

Scope creep

Which of the following documents details exactly what can be tested during a penetration test? * Scope of Work * Master Service Agreement * Non-Disclosure Agreement * Rules of Engagement

Scope of Work

Which of the following is a deviation from standard operating security protocols? * MAC filtering * Whitelisting * Security exception * Blacklisting

Security exception

Which of the following best describes social engineering? * A stealthy computer network attack in which a person or group gains unauthorized access for an extended period. * Sending an email that appears to be from a bank to trick the target into entering their credentials on a malicious website. * The process of analyzing an organization's security and locating security holes. * The art of deceiving and manipulating others into doing what you want.

The art of deceiving and manipulating others into doing what you want.

Which of the following best describes a gray box penetration test? * The ethical hacker is given full knowledge of the target or network. * The ethical hacker has no information regarding the target or network. * The ethical hacker has partial information about the target or network. * The ethical hacker is given strict guidelines about what can be targeted.

The ethical hacker has partial information about the target or network.

Which statement best describes a suicide hacker? * This hacker's main purpose is to protest an event and draw attention to their views and opinions. * This hacker is only concerned with taking down their target for a cause. They have no concerns about being caught. * This hacker may cross the line of what is ethical, but usually has good intentions and isn't being malicious. * This hacker is motivated by religious or political beliefs and wants to create severe disruption or widespread fear.

This hacker is only concerned with taking down their target for a cause. They have no concerns about being caught.

After performing a risk assessment, an organization must decide what areas of operation can be included in a penetration test and what areas cannot be included. Which of the following describes the process? * Tolerance * Mitigation * Avoidance * Transference

Tolerance

Which type of threat actor only uses skills and knowledge for defensive purposes?

White hat

Miguel is performing a penetration test. His client needs to add Miguel's computer to the list of devices allowed to connect to the network. What type of security exception is this? *White box * Whitelisting * Black box * Blacklisting

Whitelisting

Which of the following is a consideration when scheduling a penetration test? * Are there any security exceptions? * Which systems are being tested? * What risks are acceptable? * Who is aware of the test?

Who is aware of the test?


Ensembles d'études connexes

Chapter 11. Congress: Balancing National Goals and Local Interests

View Set

MCAT Behavioral Sciences Key Concepts

View Set

Introduction to Information Security

View Set