Exam 1: Ethical Hacking Overview
Exam 1: Ethical Hacking Overview50 Questions
Exam 2: Tcpip Concepts Review57 Questions
Exam 3: Network and Computer Attacks50 Questions
Exam 4: Footprinting and Social Engineering51 Questions
Exam 5: Port Scanning50 Questions
Exam 6: Enumeration50 Questions
Exam 7: Programming for Security Professionals53 Questions
Exam 8: Desktop and Server Os Vulnerabilities50 Questions
Exam 9: Embedded Operating Systems: The Hidden Threat50 Questions
Exam 10: Hacking Web Servers52 Questions
Exam 11: Hacking Wireless Networks52 Questions
Exam 12: Cryptography58 Questions
Exam 13: Network Protection Systems50 Questions
Select questions type
The ____ certification for security professionals is issued by the International Information Systems Security Certifications Consortium (ISC²).
Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
C
In the context of penetration testing, what is the gray box model?
Free
(Essay)
4.8/5
(44)
Correct Answer:
The gray box model is a hybrid of the white and black box models.In this model,the company gives a tester only partial information.For example,the tester might get information about which OSs are used,but not get any network diagrams.
What is the SANS Institute Top 20 list?
Free
(Essay)
4.7/5
(31)
Correct Answer:
One of the most popular SANS Institute documents is the Top 20 list,which details the most common network exploits and suggests ways of correcting vulnerabilities.This list offers a wealth of information for penetration testers or security professionals.
MATCHING
Match each term with the correct statement below.
a.script
f.packet monkey
b.red team
g.hacker
c.black box model
h.gray box model
d.packet monkey
i.ethical hacker
e.IRC "bot"
-sometimes employed by companies to perform penetration tests
(Short Answer)
4.9/5
(33)
Even though you might think you're following the requirements set forth by the client who hired you to perform a security test, don't assume that management will be happy with your results. Provide an example of an ethical hacking situation that might upset a manager.
(Essay)
4.8/5
(30)
Even though the Certified Information Systems Security Professional (CISSP) certification is not geared toward the technical IT professional, it has become one of the standards for many security professionals.
(True/False)
4.8/5
(25)
Many experienced penetration testers can write computer programs or ____ in Perl or the C language to carry out network attacks.
(Multiple Choice)
4.7/5
(32)
MATCHING
Match each term with the correct statement below.
a.script
f.packet monkey
b.red team
g.hacker
c.black box model
h.gray box model
d.packet monkey
i.ethical hacker
e.IRC "bot"
-copies code from knowledgeable programmers instead of creating the code himself/herself
(Short Answer)
4.8/5
(24)
MATCHING
Match each term with the correct statement below.
a.script
f.packet monkey
b.red team
g.hacker
c.black box model
h.gray box model
d.packet monkey
i.ethical hacker
e.IRC "bot"
-composed of people with varied skills who perform penetration tests
(Short Answer)
4.7/5
(35)
In a(n) ____, the tester does more than attempt to break in; he or she also analyzes the company's security policy and procedures and reports any vulnerabilities to management.
(Multiple Choice)
4.9/5
(37)
MATCHING
Match each term with the correct statement below.
a.script
f.packet monkey
b.red team
g.hacker
c.black box model
h.gray box model
d.packet monkey
i.ethical hacker
e.IRC "bot"
-program that sends automatic responses to users, giving the appearance of a person being present on the other side of the connection
(Short Answer)
4.9/5
(32)
Some hackers are skillful computer operators, but others are younger inexperienced people who experienced hackers refer to as ____.
(Multiple Choice)
4.8/5
(28)
An April 2009 article in USA Today revealed that the federal government is looking for ____ to pay them to secure the nation's networks.
(Multiple Choice)
4.9/5
(31)
The SysAdmin, Audit, Network, Security (SANS) Institute offers training and IT security certifications through Global Information Assurance Certification (GIAC).
(True/False)
4.9/5
(36)
List at least five domains tested for the Certified Ethical Hacker (CEH) exam.
(Essay)
4.7/5
(36)
MATCHING
Match each term with the correct statement below.
a.script
f.packet monkey
b.red team
g.hacker
c.black box model
h.gray box model
d.packet monkey
i.ethical hacker
e.IRC "bot"
-the tester might get information about which OSs are used, but not get any network diagrams
(Short Answer)
4.7/5
(38)
The ____ Institute Top 20 list details the most common network exploits and suggests ways of correcting vulnerabilities.
(Multiple Choice)
4.7/5
(32)
In the ____ model, the company might print a network diagram showing all the company's routers, switches, firewalls, and intrusion detection systems (IDSs) or give the tester a floor plan detailing the location of computer systems and the OSs running on these systems.
(Multiple Choice)
4.9/5
(30)
The U.S. government now has a new branch of computer crime called __________________________________________________.
(Essay)
4.9/5
(32)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)