Exam 1: Ethical Hacking Overview

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

The ____ certification for security professionals is issued by the International Information Systems Security Certifications Consortium (ISC²).

Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
Verified

C

In the context of penetration testing, what is the gray box model?

Free
(Essay)
4.8/5
(44)
Correct Answer:
Verified

The gray box model is a hybrid of the white and black box models.In this model,the company gives a tester only partial information.For example,the tester might get information about which OSs are used,but not get any network diagrams.

What is the SANS Institute Top 20 list?

Free
(Essay)
4.7/5
(31)
Correct Answer:
Verified

One of the most popular SANS Institute documents is the Top 20 list,which details the most common network exploits and suggests ways of correcting vulnerabilities.This list offers a wealth of information for penetration testers or security professionals.

MATCHING Match each term with the correct statement below. a.script f.packet monkey b.red team g.hacker c.black box model h.gray box model d.packet monkey i.ethical hacker e.IRC "bot" -sometimes employed by companies to perform penetration tests

(Short Answer)
4.9/5
(33)

Even though you might think you're following the requirements set forth by the client who hired you to perform a security test, don't assume that management will be happy with your results. Provide an example of an ethical hacking situation that might upset a manager.

(Essay)
4.8/5
(30)

Even though the Certified Information Systems Security Professional (CISSP) certification is not geared toward the technical IT professional, it has become one of the standards for many security professionals.

(True/False)
4.8/5
(25)

What are four different skills a security tester needs?

(Essay)
4.9/5
(37)

Many experienced penetration testers can write computer programs or ____ in Perl or the C language to carry out network attacks.

(Multiple Choice)
4.7/5
(32)

MATCHING Match each term with the correct statement below. a.script f.packet monkey b.red team g.hacker c.black box model h.gray box model d.packet monkey i.ethical hacker e.IRC "bot" -copies code from knowledgeable programmers instead of creating the code himself/herself

(Short Answer)
4.8/5
(24)

MATCHING Match each term with the correct statement below. a.script f.packet monkey b.red team g.hacker c.black box model h.gray box model d.packet monkey i.ethical hacker e.IRC "bot" -composed of people with varied skills who perform penetration tests

(Short Answer)
4.7/5
(35)

In a(n) ____, the tester does more than attempt to break in; he or she also analyzes the company's security policy and procedures and reports any vulnerabilities to management.

(Multiple Choice)
4.9/5
(37)

MATCHING Match each term with the correct statement below. a.script f.packet monkey b.red team g.hacker c.black box model h.gray box model d.packet monkey i.ethical hacker e.IRC "bot" -program that sends automatic responses to users, giving the appearance of a person being present on the other side of the connection

(Short Answer)
4.9/5
(32)

Some hackers are skillful computer operators, but others are younger inexperienced people who experienced hackers refer to as ____.

(Multiple Choice)
4.8/5
(28)

An April 2009 article in USA Today revealed that the federal government is looking for ____ to pay them to secure the nation's networks.

(Multiple Choice)
4.9/5
(31)

The SysAdmin, Audit, Network, Security (SANS) Institute offers training and IT security certifications through Global Information Assurance Certification (GIAC).

(True/False)
4.9/5
(36)

List at least five domains tested for the Certified Ethical Hacker (CEH) exam.

(Essay)
4.7/5
(36)

MATCHING Match each term with the correct statement below. a.script f.packet monkey b.red team g.hacker c.black box model h.gray box model d.packet monkey i.ethical hacker e.IRC "bot" -the tester might get information about which OSs are used, but not get any network diagrams

(Short Answer)
4.7/5
(38)

The ____ Institute Top 20 list details the most common network exploits and suggests ways of correcting vulnerabilities.

(Multiple Choice)
4.7/5
(32)

In the ____ model, the company might print a network diagram showing all the company's routers, switches, firewalls, and intrusion detection systems (IDSs) or give the tester a floor plan detailing the location of computer systems and the OSs running on these systems.

(Multiple Choice)
4.9/5
(30)

The U.S. government now has a new branch of computer crime called __________________________________________________.

(Essay)
4.9/5
(32)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)