100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ETHICAL HACKING ESSENTIALS EXAM PREP QUESTIONS WITH CORRECT ANSWERS. $12.49   Add to cart

Exam (elaborations)

ETHICAL HACKING ESSENTIALS EXAM PREP QUESTIONS WITH CORRECT ANSWERS.

 4 views  0 purchase
  • Course
  • HACP
  • Institution
  • HACP

ETHICAL HACKING ESSENTIALS EXAM PREP QUESTIONS WITH CORRECT ANSWERS.

Preview 4 out of 81  pages

  • October 28, 2024
  • 81
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • HACP
  • HACP
avatar-seller
LucieLucky
ETHICAL HACKING ESSENTIALS EXAM
PREP QUESTIONS WITH CORRECT
ANSWERS
The ffassurance ffthat ffthe ffsystems ffresponsible fffor ffdelivering, ffstoring, ffand
ffprocessing ffinformation ffare ffaccessible ffwhen ffrequired ffby ffauthorized ffusers ffis
ffreferred ffto ffby ffwhich ffof ffthe fffollowing ffelements ffof ffinformation ffsecurity?


A. ffnon-repudiation
B. ffintegrity
C. ffconfidentiality
D. ffavailability ff- ffAnswer ffD. ffavailability

Identify ffthe ffelement ffof ffinformation ffsecurity ffthat ffrefers ffto ffthe ffquality ffof ffbeing
ffgenuine ffor ffuncorrupted ffas ffa ffcharacteristic ffof ffany ffcommunication, ffdocuments, ffor
ffany ffdata.


A. ffintegrity
B. ffauthenticity
C. ffavailability
D. ffconfidentiality ff- ffAnswer ffB. ffauthenticity

Mark, ffa ffprofessional ffhacker, fftargets ffhis ffopponent's ffwebsite. ffHe fffinds ffsusceptible
ffuser ffinputs, ffinjects ffmalicious ffSQL ffcode ffinto ffthe ffdatabase, ffand fftampers ffwith
ffcritical ffinformation.


Which ffof ffthe fffollowing fftypes ffof ffattack ffdid ffMark ffperform ffin ffthe ffabove ffscenario?

A. ffclose-in ffattack
B. ffpassive ffattack
C. ffinsider ffattack
D. ffactive ffattack ff- ffAnswer ffD. ffactive ffattack

Ruby, ffa ffhacker, ffvisited ffher fftarget ffcompany ffdisguised ffas ffan ffaspiring ffcandidate
ffseeking ffa ffjob. ffShe ffnoticed ffthat ffcertain ffsensitive ffdocuments ffwere ffthrown ffin ffthe
fftrash ffnear ffan ffemployee's ffdesk. ffShe ffcollected ffthese ffdocuments, ffwhich ffincluded
ffcritical ffinformation ffthat ffhelped ffher ffto ffperform fffurther ffattacks.

,Identify ffthe fftype ffof ffattack ffperformed ffby ffRuby ffin ffthe ffabove ffscenario.

A. ffclose-in ffattack
B. ffpassive ffattack
C. ffinsider ffattack
D. ffactive ffattack ff- ffAnswer ffA. ffclose-in ffattack

James, ffa ffmalware ffprogrammer, ffintruded ffinto ffa ffmanufacturing ffplant ffthat ffproduces
ffcomputer ffperipheral ffdevices. ffJames fftampered ffwith ffthe ffsoftware ffinside ffdevices
ffready ffto ffbe ffdelivered ffto ffclients. ffThe fftampered ffprogram ffcreates ffa ffbackdoor ffthat
ffallows ffunauthorized ffaccess ffto ffthe ffsystems.


Identify ffthe fftype ffof ffattack ffperformed ffby ffJames ffin ffthe ffabove ffscenario ffto ffgain
ffunauthorized ffaccess ffto ffthe ffdelivered ffsystems.


A. ffdirectory fftraversal ffattack
B. ffdistribution ffattack
C. ffphishing ffattack
D. ffreplay ffattack ff- ffAnswer ffB. ffdistribution ffattack

Williams, ffan ffemployee, ffwas ffusing ffhis ffpersonal fflaptop ffwithin ffthe fforganization's
ffpremises. ffHe ffconnected ffhis fflaptop ffto ffthe fforganization's ffinternal ffnetwork ffand
ffbegan ffeavesdropping ffon ffthe ffcommunication ffbetween ffother ffdevices ffconnected ffto
ffthe ffinternal ffnetwork. ffHe ffsniffed ffcritical ffinformation ffsuch ffas fflogin ffcredentials ffand
ffother ffconfidential ffdata ffpassing ffthrough ffthe ffnetwork.


Identify ffthe fftype ffof ffattack ffperformed ffby ffWilliams ffin ffthe ffabove ffscenario.

A. ffphishing ffattack
B. ffSQL ffinjection ffattack
C. ffinsider ffattack
D. ffreplay ffattack ff- ffAnswer ffC. ffinsider ffattack

Jack ffis ffworking ffas ffa ffmalware ffanalyst ffin ffan fforganization. ffHe ffwas ffassigned ffto
ffinspect ffan ffattack ffperformed ffagainst ffthe fforganization. ffJack ffdetermined ffthat ffthe
ffattacker ffhad ffrestricted ffaccess ffto ffthe ffmain ffcomputer's fffiles ffand fffolders ffand ffwas
ffdemanding ffan ffonline ffpayment ffto ffremove ffthese ffrestrictions.


Which ffof ffthe fffollowing fftype ffof ffattack ffhas ffJack ffidentified ffin ffthe ffabove ffscenario?

A. ffphishing
B. ffsniffing
C. ffransomware
D. ffbotnet ff- ffAnswer ffC. ffransomware

,Identify ffthe fftype ffof ffattack ffvector ffthat fffocuses ffon ffstealing ffinformation fffrom ffthe
ffvictim ffmachine ffwithout ffits ffuser ffbeing ffaware ffand fftries ffto ffdeliver ffa ffpayload
ffaffecting ffcomputer ffperformance.


A. ffATP ffattack
B. ffbotnet
C. ffinsider ffattack
D. ffphishing ff- ffAnswer ffA. ffATP ffattack

Andrew, ffa ffprofessional ffhacker, ffdrafts ffan ffemail ffthat ffappears ffto ffbe fflegitimate ffand
ffattaches ffmalicious fflinks ffto fflure ffvictims; ffhe ffthen ffdistributes ffit ffthrough
ffcommunication ffchannels ffor ffmails ffto ffobtain ffprivate ffinformation fflike ffaccount
ffnumbers.


Identify ffthe fftype ffof ffattack ffvector ffemployed ffby ffAndrew ffin ffthe ffabove ffscenario.

A. ffbotnet
B. ffphishing
C. ffransomware
D. ffinsider ffattack ff- ffAnswer ffB. ffphishing

Identify ffthe ffinsider ffattack ffwherein ffthe ffmiscreant ffcan ffeasily ffbypass ffsecurity ffrules
ffby ffusing ffprivileged ffaccess ffand ffcause ffa ffthreat ffto ffthe fforganization's ffinformation
ffsystems.


A. ffSQL ffinjection
B. ffdirectory fftraversal ffattack
C. ffpod ffslurping
D. ffXSS ffattack ff- ffAnswer ffC. ffpod ffslurping

Which ffof ffthe fffollowing ffacts ffdefines fflegal ffprohibitions ffagainst ffcircumvention ffof ffthe
fftechnological ffprotection ffmeasures ffemployed ffby ffcopyright ffowners ffto ffprotect fftheir
ffworks ffand ffagainst ffthe ffremoval ffor ffalteration ffof ffcopyright ffmanagement
ffinformation?


A. ffHIPAA
B. ffDMCA
C. ffDPA
D. ffPCI/DSS ff- ffAnswer ffB. ffDMCA

An fforganization fflocated ffin ffEurope ffmaintains ffa fflarge ffamount ffof ffuser ffdata ffby
fffollowing ffall ffthe ffsecurity-related fflaws. ffIt ffalso fffollows ffGDPR ffprotection ffprinciples,
ffone ffof ffwhich ffstates ffthat ffthe fforganization ffshould ffonly ffcollect ffand ffprocess ffdata
ffnecessary fffor ffthe ffspecified fftask.

, Which ffof ffthe fffollowing ffGDPR ffprotection ffprinciple ffis ffdiscussed ffin ffthe ffabove
ffscenario?


A. ffaccuracy
B. ffpurpose fflimitation
C. fflawfulness, fffairness, ffand fftransparency
D. ffdata ffminimization ff- ffAnswer ffD. ffdata ffminimization

Which ffof ffthe fffollowing fftitles ffin ffThe ffDigital ffMillennium ffCopyright ffAct ff(DMCA)
ffallows ffthe ffowner ffof ffa ffcopy ffof ffa ffprogram ffto ffmake ffreproductions ffor ffadaptations
ffwhen ffthese ffare ffnecessary ffto ffuse ffthe ffprogram ffin ffconjunction ffwith ffa ffsystem?


A. fftitle ffII: ffonline ffcopyright ffinfringement ffliability fflimitation
B. fftitle ffI: ffWIPO fftreaty ffimplementation
C. fftitle ffV: ffprotection ffof ffcertain fforiginal ffdesigns
D. fftitle ffIII: ffcomputer ffmaintenance ffor ffrepair ff- ffAnswer ffD. fftitle ffIII: ffcomputer
ffmaintenance ffand ffrepar


Which ffof ffthe fffollowing fftitles ffof ffthe ffSarbanes ffOxley ffAct ff(SOX) ffmandates ffthat
ffonly ffsenior ffexecutives ffshould fftake ffindividual ffresponsibility fffor ffthe ffaccuracy ffand
ffcompleteness ffof ffcorporate fffinancial ffreports?


A. fftitle ffVIII: ffcorporate ffand ffcriminal fffraud ffaccountability
B. fftitle ffV: ffanalyst ffconflicts ffof ffinterest
C. fftitle ffIII: ffcorporate ffresponsibility
D. fftitle ffX: ffcorporate fftax ffreturns ff- ffAnswer ffC. fftitle ffIII: ffcorporate ffresponsibility

Which ffof ffthe fffollowing ffcountries ffhas ffimplemented ffthe ffcyber fflaw ff"Regulation ffof
ffInvestigatory ffPowers ffAct ff2000"?


A. ffGermany
B. ffIndia
C. ffAustralia
D. ffUnited ffKingdom ff- ffAnswer ffD. ffUnited ffKingdom

Adele, ffa ffprofessional ffhacker, ffinitiated ffan ffattack ffon ffan fforganization. ffDuring ffthe
ffcourse ffof ffthis ffattack, ffhe ffestablished ffa fftwo-way ffcommunication ffchannel ffbetween
ffthe fftarget ffsystem ffand ffhis ffserver ffto ffcommunicate ffand ffpass ffdata ffback ffand
ffforth. ffAdditionally, ffhe ffemployed ffencryption ffto ffhide ffthe ffcommunication ffchannel.


Which ffof ffthe fffollowing ffphases ffof ffcyber ffkill ffchain ffmethodology ffwas ffAdele
ffperforming ffin ffthe ffabove ffscenario?


A. ffcommand ffand ffcontrol
B. ffweaponization
C. ffdelivery

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller LucieLucky. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

80796 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.49
  • (0)
  Add to cart