Exam 1: Ethical Hacking and Testing
Exam 1: Ethical Hacking and Testing52 Questions
Exam 2: Information Gathering65 Questions
Exam 3: Malicious Code58 Questions
Exam 4: Operating Systems and Applications63 Questions
Exam 5: Networks and Services64 Questions
Select questions type
Which of the following types of hosts are completely exposed to risk?
Free
(Multiple Choice)
4.8/5
(37)
Correct Answer:
C
Which of the following phrases is a derogatory term and would only invite retaliation?
Free
(Multiple Choice)
4.9/5
(38)
Correct Answer:
A
Devon has been "dumpster diving". He went through is target's garbage and recycle bins getting all he could. What is the term used to describe what he will most likely do with these documents?
Free
(Multiple Choice)
5.0/5
(35)
Correct Answer:
D
Someone downloads a tool from the Internet and uses it to experiment with an idea she got from a YouTube video. Another exam you recently passed considers this unethical and inappropriate. A friend of yours just considers this person to be a "script kiddie." You have your own opinions, but what is the most defensive way to respond to this scenario?
(Multiple Choice)
4.9/5
(28)
If attackers experimenting with the latest botnet tool decided to seize control of some federal computers for the purposes of committing a fraud utilizing symbolic data such as credit card information they would be in violation of:
(Multiple Choice)
4.8/5
(36)
You want to determine the web server and host operating system of a target. For legal reasons, you worry about getting caught. A passive recon technique that cannot be detected might be a good idea.
Which of the following choices holds the least risk of detection?
(Multiple Choice)
4.9/5
(41)
You are researching an adversary and are certain that you saw some incriminating information on their website about six months ago, but it isn't there now. What resource below might be the quickest way to check for this data?
(Multiple Choice)
4.9/5
(33)
Maureen returns from lunch and notices her PC has a BSOD but the hard drive activity light is still flashing. What tool is possibly being used?
(Multiple Choice)
4.8/5
(28)
Neil is conducting security research on a popular software application and discovers a buffer overflow. He considers reporting his finding to the vendor but realizes the EULA (End User License Agreement)
Forbids this kind of research.
What should Neil do?
(Multiple Choice)
4.8/5
(36)
Sean is having a conversation with a friend, making fun of how foolish spammers are. Clearly, he says "These emails are just sent by the millions and look like it. Only an idiot falls for them." In the meanwhile Sean is reading an email addressed to him. It says:
---
Dear Sean,
I understand you did some work awhile back for an orfanage in Brazil. Sorry to bother you sir, we have never meet, but I am a 13 year old boy whose parents were taken the the states. I need some money to get them to reurn safely or if I can greet them there in the states too. Can you help?
---
Sean remembers his trip to Brazil and thinks of a boy he met there (He met hundreds, but the mind plays tricks like this on the best of us). He wonders for a moment if this might be him.
What technique is Sean about to fall prey too?
(Multiple Choice)
4.7/5
(42)
Which of the following represents the greatest danger to enterprise networks?
(Multiple Choice)
4.8/5
(28)
When he is finished footprinting the network the next step an attacker would take is:
(Multiple Choice)
4.8/5
(38)
During a pentest, you retrieve a USB key from a box of discarded hardware that was just sitting by a number of other items. You check the key for files and it turns out to have a number of .pdf documents that could have sensitive information. If this information were to get leaked it would be a great risk to your client. In your report you point this out but the customer doesn't see the problem as all of the documents were password protected.
Why isn't this enough to prevent the information leakage?
(Multiple Choice)
4.9/5
(39)
Hayley decides to circumvent the copy protection laws by taking an entire movie she recorded on her cell phone in the theatre and appending it with an insightful review and claims this is journalism and free speech. She still gets sued and loses. Why?
(Multiple Choice)
4.9/5
(43)
Which of the following are ways to overcome insider threats? (Choose up to 7)
(Multiple Choice)
4.9/5
(36)
When attackers have gained and then maintained access to a system it is said they have installed a…
(Multiple Choice)
4.8/5
(32)
The sales manager for your company nicknamed "Zig", is looking for a creative way to advertise and grow the business. He accesses a popular technical forum website and asks a question he knows many in the group will be able to answer. He thanks them for their help "in advance" (TIA) while suggesting everyone should visit his site for more information about his question.
One poster responds back with a link to a page called http://www.superdupersalesleadsUSA.cx and compliments Zig on his fantastic website. He said he can assist better if Zig could fill out the contact form on that page, and will also refer a number of new clients in case Zig is interested.
The sales manager gets suspicious and asks you for advice. What can you say to him?
(Multiple Choice)
4.7/5
(34)
Systems that have default configurations are common targets during a pentest. Which of the following is not a default configuration?
(Multiple Choice)
4.7/5
(33)
Showing 1 - 20 of 52
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)