Exam 1: Ethical Hacking Overview

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Penetration testing can create ethical,technical,and privacy concerns for a company's management team.What can a security consultant do to ensure the client fully understands the scope of testing that will be performed?

Free
(Multiple Choice)
4.8/5
(24)
Correct Answer:
Verified

A

What type of testing procedure involves the tester(s)analyzing the company's security policy and procedures,and reporting any vulnerabilities to management?

Free
(Multiple Choice)
4.7/5
(29)
Correct Answer:
Verified

B

What penetration model would likely provide a network diagram showing all the company's routers,switches,firewalls,and intrusion detection systems,or give the tester a floor plan detailing the location of computer systems and the OSs running on these systems?

Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
Verified

B

List at least five domains tested for the Certified Ethical Hacker (CEH)exam.

(Essay)
4.8/5
(28)

Match each item with a statement below. -An individual who breaks into a company's computer system legally when employed or contracted by that company

(Multiple Choice)
4.9/5
(31)

Port scanning is a noninvasive,nondestructive,and legal testing procedure that is protected by federal law.

(True/False)
4.9/5
(31)

When a security professional is presented with a contract drawn up by a company's legal department,which allows them to "hack" the company's network,they should proceed by performing what precautionary step?

(Multiple Choice)
4.8/5
(33)

Why should a security professional or student learning hacking techniques be aware of the local,state,and federal laws that apply to their field of study?

(Essay)
4.9/5
(40)

What professional level security certification did the "International Information Systems Security Certification Consortium" (ISC2)develop?

(Multiple Choice)
4.8/5
(34)

What type of assessment performed by a penetration tester attempts to identify all the weaknesses found in an application or on a system?

(Multiple Choice)
4.7/5
(28)

Even though the Certified Information Systems Security Professional (CISSP)certification is not geared toward the technical IT professional,it has become one of the standards for many security professionals.

(True/False)
4.7/5
(38)

What name is given to people who break into computer systems with the sole purpose to steal or destroy data?

(Multiple Choice)
4.8/5
(44)

What security certification did the "The International Council of Electronic Commerce Consultants" (EC-Council)develop?

(Multiple Choice)
4.8/5
(36)

What acronym represents the U.S.Department of Justice new branch that addresses computer crime?

(Multiple Choice)
4.8/5
(39)

Why is it a challenge and concern for an ethical hacker to avoid breaking any laws?

(Essay)
4.9/5
(39)

Why are employees sometimes not told that the company's computer systems are being monitored?

(Essay)
4.9/5
(30)

Match each item with a statement below. -A person who breaks into systems to steal or destroy data

(Multiple Choice)
4.8/5
(35)

An ethical hacker is a person who performs most of the same activities a hacker does,but with the owner or company's permission.

(True/False)
4.8/5
(39)

A Security professional may think they are following the requirements set forth by the client who hired them to perform a security test,don't assume that management will be happy with the test results.Provide an example of an ethical hacking situation that might upset a manager.

(Essay)
4.7/5
(41)

What professional level security certification requires five years of experience and is designed to focus on an applicant's security-related managerial skills?

(Multiple Choice)
4.8/5
(29)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)