Exam 1: Ethical Hacking Overview

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

All states look at port scanning as noninvasive or nondestructive in nature and deem it legal.

(True/False)
4.9/5
(28)

The ____ certification uses the Open Source Security Testing Methodology Manual (OSSTMM), written by Peter Herzog, as its standardized methodology.

(Multiple Choice)
4.9/5
(31)

Describe some actions which security testers cannot perform legally.

(Essay)
4.9/5
(35)

In a(n) ____________________, an ethical hacker attempts to break into a company's network to find the weakest link in that network or one of its systems.

(Short Answer)
4.8/5
(41)

The collection of tools for conducting vulnerability assessments and attacks is sometimes referred to as a "____".

(Multiple Choice)
4.8/5
(35)

A ____ can be created that welcomes new users joining a chat session, even though a person isn't actually present to welcome them.

(Multiple Choice)
5.0/5
(33)

MATCHING Match each term with the correct statement below. a.script f.packet monkey b.red team g.hacker c.black box model h.gray box model d.packet monkey i.ethical hacker e.IRC "bot" -set of instructions that runs in sequence to perform tasks on a computer system

(Short Answer)
4.9/5
(40)

The ____ disseminates research documents on computer and network security worldwide at no cost.

(Multiple Choice)
4.9/5
(32)

Currently, the CEH exam is based on ____ domains (subject areas) with which the tester must be familiar.

(Multiple Choice)
4.9/5
(30)

"____" is not a domain tested for the CEH exam.

(Multiple Choice)
4.9/5
(24)
Showing 41 - 50 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)