Exam 1: Ethical Hacking Overview
Exam 1: Ethical Hacking Overview50 Questions
Exam 2: Tcpip Concepts Review49 Questions
Exam 3: Network and Computer Attacks50 Questions
Exam 4: Footprinting and Social Engineering48 Questions
Exam 5: Port Scanning50 Questions
Exam 6: Enumeration50 Questions
Exam 7: Programming for Security Professionals50 Questions
Exam 8: Desktop and Server Os Vulnerabilities50 Questions
Exam 9: Embedded Operating Systems: the Hidden Threat59 Questions
Exam 10: Hacking Web Servers49 Questions
Exam 11: Hacking Wireless Networks50 Questions
Exam 12: Cryptography50 Questions
Exam 13: Network Protection Systems59 Questions
Select questions type
Match each item with a statement below.
-A test that does not divulge to staff that penetration testing is being conducted or disclose what technologies the company is using to the security professional
(Multiple Choice)
4.7/5
(37)
What type of laws should a penetration tester or student learning hacking techniques be aware of?
(Multiple Choice)
4.9/5
(36)
Match each item with a statement below.
-An individual who breaks into a computer system illegally
(Multiple Choice)
5.0/5
(40)
Match each item with a statement below.
-Hybrid of the white and black box models used for penetration testing
(Multiple Choice)
4.8/5
(40)
What term best describes a person who hacks computer systems for political or social reasons?
(Multiple Choice)
4.8/5
(36)
What federal law makes it illegal to intercept any type of communication,regardless of how it was transmitted?
(Multiple Choice)
4.9/5
(42)
What policy,provide by a typical ISP,should be read and understood before performing any port scanning outside of your private network?
(Multiple Choice)
4.8/5
(29)
What penetration model should be used when a company's management team does not wish to disclose that penetration testing is being conducted?
(Multiple Choice)
4.9/5
(33)
What security certification uses the Open Source Security Testing Methodology Manual (OSSTMM)as its standardized methodology?
(Multiple Choice)
4.9/5
(38)
If you work for a company as a security professional,you will most likely be placed on a special team that will conduct penetration tests.What is the standard name for a team made up of security professionals?
(Multiple Choice)
4.9/5
(37)
What subject area is not one of the 22 domains tested during the CEH exam?
(Multiple Choice)
4.8/5
(25)
Penetration testers and security testers need technical skills to perform their duties effectively.
(True/False)
4.9/5
(25)
What are four different skills a security tester needs to be successful?
(Essay)
4.9/5
(34)
What organization disseminates research documents on computer and network security worldwide at no cost?
(Multiple Choice)
4.7/5
(26)
Match each item with a statement below.
-Inexperienced people who copy code or use tools created by knowledgeable programmers
(Multiple Choice)
4.9/5
(28)
What derogatory title do experienced hackers,who are skilled computer operators,give to inexperienced hackers?
(Multiple Choice)
4.9/5
(39)
Match each item with a statement below.
-A group of people with varied skills who perform penetration tests
(Multiple Choice)
4.8/5
(40)
Showing 21 - 40 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)