Exam 1: Ethical Hacking Overview

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Match each item with a statement below. -A test that does not divulge to staff that penetration testing is being conducted or disclose what technologies the company is using to the security professional

(Multiple Choice)
4.7/5
(37)

What type of laws should a penetration tester or student learning hacking techniques be aware of?

(Multiple Choice)
4.9/5
(36)

In the context of penetration testing,what is the gray box model?

(Essay)
4.9/5
(31)

Describe some actions which security testers cannot perform legally.

(Essay)
4.8/5
(29)

Match each item with a statement below. -An individual who breaks into a computer system illegally

(Multiple Choice)
5.0/5
(40)

Match each item with a statement below. -Hybrid of the white and black box models used for penetration testing

(Multiple Choice)
4.8/5
(40)

What term best describes a person who hacks computer systems for political or social reasons?

(Multiple Choice)
4.8/5
(36)

What federal law makes it illegal to intercept any type of communication,regardless of how it was transmitted?

(Multiple Choice)
4.9/5
(42)

What policy,provide by a typical ISP,should be read and understood before performing any port scanning outside of your private network?

(Multiple Choice)
4.8/5
(29)

What penetration model should be used when a company's management team does not wish to disclose that penetration testing is being conducted?

(Multiple Choice)
4.9/5
(33)

What security certification uses the Open Source Security Testing Methodology Manual (OSSTMM)as its standardized methodology?

(Multiple Choice)
4.9/5
(38)

If you work for a company as a security professional,you will most likely be placed on a special team that will conduct penetration tests.What is the standard name for a team made up of security professionals?

(Multiple Choice)
4.9/5
(37)

What subject area is not one of the 22 domains tested during the CEH exam?

(Multiple Choice)
4.8/5
(25)

Penetration testers and security testers need technical skills to perform their duties effectively.

(True/False)
4.9/5
(25)

What are four different skills a security tester needs to be successful?

(Essay)
4.9/5
(34)

What organization disseminates research documents on computer and network security worldwide at no cost?

(Multiple Choice)
4.7/5
(26)

As a security tester,you can make a network impenetrable.

(True/False)
4.8/5
(33)

Match each item with a statement below. -Inexperienced people who copy code or use tools created by knowledgeable programmers

(Multiple Choice)
4.9/5
(28)

What derogatory title do experienced hackers,who are skilled computer operators,give to inexperienced hackers?

(Multiple Choice)
4.9/5
(39)

Match each item with a statement below. -A group of people with varied skills who perform penetration tests

(Multiple Choice)
4.8/5
(40)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)