Exam 1: Ethical Hacking Overview

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What is the SANS Institutes "Top 25 Software Errors" list?

(Essay)
4.8/5
(36)

Match each item with a statement below. -Analysis of a company's security policy and procedures followed with a report disclosing any vulnerabilities to management

(Multiple Choice)
4.9/5
(32)

Match each item with a statement below. -An ethical attempt to break into a company's network or applications to find weak links

(Multiple Choice)
4.9/5
(29)

What penetration model should a company use if they only want to allow the penetration tester(s)partial or incomplete information regarding their network system?

(Multiple Choice)
4.8/5
(29)

What common term is used by security testing professionals to describe vulnerabilities in a network?

(Multiple Choice)
4.8/5
(33)

What professional security certification requires applicants to demonstrate hands-on abilities to earn their certificate?

(Multiple Choice)
4.9/5
(42)

Match each item with a statement below. -An attempt to identify all the unprotected areas found in an application or on a system

(Multiple Choice)
4.8/5
(31)

Many experienced penetration testers will write a set of instructions that runs in sequence to perform tasks on a computer system.What type of resource are these penetration testers utilizing?

(Multiple Choice)
4.9/5
(30)

What specific term does the U.S.Department of Justice use to label all illegal access to computer or network systems?

(Multiple Choice)
4.8/5
(28)

Why are ethical hackers employed or contracted by a company to conduct vulnerability assessments,penetration tests,and security tests?

(Essay)
4.9/5
(37)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)