Exam 1: Ethical Hacking Overview
Exam 1: Ethical Hacking Overview50 Questions
Exam 2: Tcpip Concepts Review49 Questions
Exam 3: Network and Computer Attacks50 Questions
Exam 4: Footprinting and Social Engineering48 Questions
Exam 5: Port Scanning50 Questions
Exam 6: Enumeration50 Questions
Exam 7: Programming for Security Professionals50 Questions
Exam 8: Desktop and Server Os Vulnerabilities50 Questions
Exam 9: Embedded Operating Systems: the Hidden Threat59 Questions
Exam 10: Hacking Web Servers49 Questions
Exam 11: Hacking Wireless Networks50 Questions
Exam 12: Cryptography50 Questions
Exam 13: Network Protection Systems59 Questions
Select questions type
Match each item with a statement below.
-Analysis of a company's security policy and procedures followed with a report disclosing any vulnerabilities to management
(Multiple Choice)
4.9/5
(32)
Match each item with a statement below.
-An ethical attempt to break into a company's network or applications to find weak links
(Multiple Choice)
4.9/5
(29)
What penetration model should a company use if they only want to allow the penetration tester(s)partial or incomplete information regarding their network system?
(Multiple Choice)
4.8/5
(29)
What common term is used by security testing professionals to describe vulnerabilities in a network?
(Multiple Choice)
4.8/5
(33)
What professional security certification requires applicants to demonstrate hands-on abilities to earn their certificate?
(Multiple Choice)
4.9/5
(42)
Match each item with a statement below.
-An attempt to identify all the unprotected areas found in an application or on a system
(Multiple Choice)
4.8/5
(31)
Many experienced penetration testers will write a set of instructions that runs in sequence to perform tasks on a computer system.What type of resource are these penetration testers utilizing?
(Multiple Choice)
4.9/5
(30)
What specific term does the U.S.Department of Justice use to label all illegal access to computer or network systems?
(Multiple Choice)
4.8/5
(28)
Why are ethical hackers employed or contracted by a company to conduct vulnerability assessments,penetration tests,and security tests?
(Essay)
4.9/5
(37)
Showing 41 - 50 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)