Exam 1: Ethical Hacking Overview
Exam 1: Ethical Hacking Overview50 Questions
Exam 2: Tcpip Concepts Review49 Questions
Exam 3: Network and Computer Attacks50 Questions
Exam 4: Footprinting and Social Engineering48 Questions
Exam 5: Port Scanning50 Questions
Exam 6: Enumeration50 Questions
Exam 7: Programming for Security Professionals50 Questions
Exam 8: Desktop and Server Os Vulnerabilities50 Questions
Exam 9: Embedded Operating Systems: the Hidden Threat59 Questions
Exam 10: Hacking Web Servers49 Questions
Exam 11: Hacking Wireless Networks50 Questions
Exam 12: Cryptography50 Questions
Exam 13: Network Protection Systems59 Questions
Select questions type
Penetration testing can create ethical,technical,and privacy concerns for a company's management team.What can a security consultant do to ensure the client fully understands the scope of testing that will be performed?
Free
(Multiple Choice)
4.8/5
(24)
Correct Answer:
A
What type of testing procedure involves the tester(s)analyzing the company's security policy and procedures,and reporting any vulnerabilities to management?
Free
(Multiple Choice)
4.7/5
(29)
Correct Answer:
B
What penetration model would likely provide a network diagram showing all the company's routers,switches,firewalls,and intrusion detection systems,or give the tester a floor plan detailing the location of computer systems and the OSs running on these systems?
Free
(Multiple Choice)
4.8/5
(34)
Correct Answer:
B
List at least five domains tested for the Certified Ethical Hacker (CEH)exam.
(Essay)
4.8/5
(28)
Match each item with a statement below.
-An individual who breaks into a company's computer system legally when employed or contracted by that company
(Multiple Choice)
4.9/5
(31)
Port scanning is a noninvasive,nondestructive,and legal testing procedure that is protected by federal law.
(True/False)
4.9/5
(31)
When a security professional is presented with a contract drawn up by a company's legal department,which allows them to "hack" the company's network,they should proceed by performing what precautionary step?
(Multiple Choice)
4.8/5
(33)
Why should a security professional or student learning hacking techniques be aware of the local,state,and federal laws that apply to their field of study?
(Essay)
4.9/5
(40)
What professional level security certification did the "International Information Systems Security Certification Consortium" (ISC2)develop?
(Multiple Choice)
4.8/5
(34)
What type of assessment performed by a penetration tester attempts to identify all the weaknesses found in an application or on a system?
(Multiple Choice)
4.7/5
(28)
Even though the Certified Information Systems Security Professional (CISSP)certification is not geared toward the technical IT professional,it has become one of the standards for many security professionals.
(True/False)
4.7/5
(38)
What name is given to people who break into computer systems with the sole purpose to steal or destroy data?
(Multiple Choice)
4.8/5
(44)
What security certification did the "The International Council of Electronic Commerce Consultants" (EC-Council)develop?
(Multiple Choice)
4.8/5
(36)
What acronym represents the U.S.Department of Justice new branch that addresses computer crime?
(Multiple Choice)
4.8/5
(39)
Why is it a challenge and concern for an ethical hacker to avoid breaking any laws?
(Essay)
4.9/5
(39)
Why are employees sometimes not told that the company's computer systems are being monitored?
(Essay)
4.9/5
(30)
Match each item with a statement below.
-A person who breaks into systems to steal or destroy data
(Multiple Choice)
4.8/5
(35)
An ethical hacker is a person who performs most of the same activities a hacker does,but with the owner or company's permission.
(True/False)
4.8/5
(39)
A Security professional may think they are following the requirements set forth by the client who hired them to perform a security test,don't assume that management will be happy with the test results.Provide an example of an ethical hacking situation that might upset a manager.
(Essay)
4.7/5
(41)
What professional level security certification requires five years of experience and is designed to focus on an applicant's security-related managerial skills?
(Multiple Choice)
4.8/5
(29)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)