Exam 1: Ethical Hacking Overview

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____ takes penetration testing to a higher level.

(Multiple Choice)
4.9/5
(38)

In the ____ model, management does not divulge to staff that penetration testing is being conducted, nor does it give the tester any diagrams or describe what technologies the company is using.

(Multiple Choice)
4.8/5
(24)

In the ____________________ model, the tester is told what network topology and technology the company is using and is given permission to interview IT personnel and company employees.

(Short Answer)
4.9/5
(29)

Penetration testers and security testers usually have a laptop computer configured with ____ and hacking tools.

(Multiple Choice)
4.7/5
(35)

Some of the most infamous cases are hacks carried out by ____ students, such as the eBay hack of 1999.

(Multiple Choice)
4.8/5
(34)

Employees of a security company are protected under the company's ____________________ with the client.

(Short Answer)
4.8/5
(37)

As a security tester, you can't make a network impenetrable.

(True/False)
4.8/5
(41)

Ethical hackers are employed or contracted by a company to do what illegal hackers do: break in. Why?

(Essay)
4.8/5
(31)

The International Council of Electronic Commerce Consultants (EC-Council) has developed a certification designation called ____.

(Multiple Choice)
4.7/5
(35)

The ____ certification is designated by the Institute for Security and Open Methodologies (ISECOM), a nonprofit organization that provides security training and certification programs for security professionals.

(Multiple Choice)
4.9/5
(42)

Those who break into systems to steal or destroy data are often referred to as ____________________.

(Short Answer)
4.9/5
(32)

MATCHING Match each term with the correct statement below. a.script f.packet monkey b.red team g.hacker c.black box model h.gray box model d.packet monkey i.ethical hacker e.IRC "bot" -accesses a computer system or network without the authorization of the system's owner

(Short Answer)
4.9/5
(31)

MATCHING Match each term with the correct statement below. a.script f.packet monkey b.red team g.hacker c.black box model h.gray box model d.packet monkey i.ethical hacker e.IRC "bot" -Derogatory term referring to people who copy code from knowledgeable programmers instead of creating the code themselves.

(Short Answer)
4.7/5
(41)

An ethical hacker is a person who performs most of the same activities a cracker does, but with the owner or company's permission.

(True/False)
4.9/5
(36)

If being liked by others is important to you, you might want to consider a different profession than penetration testing. Why?

(Essay)
4.8/5
(41)

The SysAdmin,Audit,Network, Security (SANS) Institute offers training and IT security certifications through ____.

(Multiple Choice)
4.9/5
(29)

MATCHING Match each term with the correct statement below. a.script f.packet monkey b.red team g.hacker c.black box model h.gray box model d.packet monkey i.ethical hacker e.IRC "bot" -puts the burden on the tester to find out what technologies the company is using

(Short Answer)
4.7/5
(27)

Why are employees sometimes not told that the company is being monitored?

(Essay)
4.9/5
(44)

Why is it hard for an ethical hacker to avoid breaking any laws?

(Essay)
5.0/5
(32)

The U.S. Department of Justice labels all illegal access to computer or network systems as "____".

(Multiple Choice)
4.8/5
(40)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)