100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Ethical Hacking Chapter 1-5 Review Questions and Correct Answers $8.99   Add to cart

Exam (elaborations)

Ethical Hacking Chapter 1-5 Review Questions and Correct Answers

 1 view  0 purchase
  • Course
  • Ethical Hacking
  • Institution
  • Ethical Hacking

The U.S. Department of Justice defines a hacker as which of the following? A person who accesses a computer or network without the owner's permission A penetration tester is which of the following? A security professional who's hired to hack into a network to discover vulnerabilities A team compo...

[Show more]

Preview 2 out of 5  pages

  • September 23, 2024
  • 5
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Ethical Hacking
  • Ethical Hacking
avatar-seller
twishfrancis
Ethical Hacking Chapter 1-5 Review
Questions and Correct Answers
The U.S. Department of Justice defines a hacker as which of the following? ✅A person
who accesses a computer or network without the owner's permission

A penetration tester is which of the following? ✅A security professional who's hired to
hack into a network to discover vulnerabilities

A team composed of people with varied skills who attempt to penetrate a network is
referred to as which of the following? ✅Red team

How can you find out which computer crime laws are applicable in your state?
✅Contact your local law enforcement agencies.

What portion of your ISP contract might affect your ability to conduct a penetration test
over the Internet? ✅Acceptable use policy

If you run a program in New York City that uses network resources to the extent that a
user is denied access to them, what type of law have you violated? ✅Federal

Which federal law prohibits unauthorized access of classified information? ✅Computer
Fraud and Abuse Act, Title 18

Which federal law prohibits intercepting any communication, regardless of how it was
transmitted? ✅Electronic Communication Privacy Act

Which federal law amended Chapter 119 of Title 18, U.S. Code? ✅U.S. Patriot Act,
Sec. 217: Interception of Computer Trespasser Communications

To determine whether scanning is illegal in your area, you should do which of the
following? ✅Refer to state laws.

What organization offers the Certified Ethical Hacker (CEH) certification exam? ✅EC-
Council

What organization designates a person as a CISSP? ✅International Information
Systems Security Certification Consortium (ISC2)

What organization designates a person as an OPST? ✅ISECOM

, As a security tester, what should you do before installing hacking software on your
computer? ✅Check with local law enforcement agencies.

Which organization issues the Top 20 list of current network vulnerabilities? ✅SANS
Institute

The Netstat command indicates that POP3 is in use on a remote server. Which port is
the remote server most likely using? ✅Port 110

On a Windows computer, what command can you enter to show all open ports being
used? ✅Netstat

Which protocol uses UDP? ✅TFTP

Which protocol offers guaranteed delivery and is connection oriented? ✅TCP

TCP communication could be likened to which of the following? ✅Phone conversation

Which command verifies the existence of a node on a network? ✅Ping

What protocol is used for reporting or informational purposes? ✅ICMP

What port, other than port 110, is used to retrieve e-mail? ✅Port 143

What port does DNS use? ✅Port 53

That command is used to log on to a remote server, computer, or router? ✅Telnet

Which of the following is not a valid octal number? ✅3482

The initial sequence number (ISN) is set at which step of the TCP three-way
handshake? ✅1 and 2

A Ping command initially uses which ICMP type code? ✅Type 8

"Destination Unreachable" is designated by which ICMP type code? ✅Type 3

What's the hexadecimal equivalent of the binary number 1111 1111? ✅FF

What is the main purpose of Malware? ✅Doing harm to a computer system

A computer _____ relies on a host to propagate throughout a network. ✅Virus

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller twishfrancis. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $8.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

77254 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$8.99
  • (0)
  Add to cart