100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Ethical Hacking Final Exam Study Guide with Questions and Correct Answers $8.99   Add to cart

Exam (elaborations)

Ethical Hacking Final Exam Study Guide with Questions and Correct Answers

 2 views  0 purchase
  • Course
  • Ethical Hacking
  • Institution
  • Ethical Hacking

Which of the following is a non-profit organization that is in favor of hacking in the traditional sense and advocates for the expression of electronic freedom? a) Freetonic b) Free Internet c) Electronic Frontier Foundation d) Anonymous Electronic Frontier Foundation is considered a hacktivist gr...

[Show more]

Preview 2 out of 11  pages

  • September 23, 2024
  • 11
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Ethical Hacking
  • Ethical Hacking
avatar-seller
twishfrancis
Ethical Hacking Final Exam Study Guide
with Questions and Correct Answers
Which of the following is a non-profit organization that is in favor of hacking in the
traditional sense and advocates for the expression of electronic freedom?
a) Freetonic
b) Free Internet
c) Electronic Frontier Foundation
d) Anonymous ✅Electronic Frontier Foundation

is considered a hacktivist group.
a) Skids
b) Free Internet
c) Hack Justice
d) WikiLeaks ✅WikiLeaks

For the U.S. Department of Justice, which of the following is not treated the same with
regard to the law for combatting cybercrimes because their activities may not break the
law?
a) Hackers
b) Crackers
c) Packet monkeys
d) None of the above ✅None of the above

Which of the following is not considered a type of social engineering activity that an
ethical hacking can conduct?
a) Sending phishing email to a company's employees.
b) Making phone calls targeting a company's employees in attempt to test the likelihood
that some of them may give away login credentials
c) Using the kindness card when talking to a company's employees in an attempt make
them comfortable and reveal secrets that may jeopardize the company's network
security
d) Contacting companies' employees through social media to establish trust with the
goal of getting them to reveal sensitive information
e) None of the above ✅None of the above

Analyzing computer programs manually trying to discover bad programming that is done
without security in mind is part of what ethical hackers do.
a) True
b) False ✅True
This is called code review.

Which of the following should be used to scan a Windows-based computer in order to
generate a report showing the applications installed and the potential exposures?

, a) Netsparker
b) AirCrack
c) MBSA
d) All of the above ✅MBSA
Netsparker is a scanner for scanning Web applications for vulnerabilities. AirCrack is
packet sniffer a key cracking tool for wireless networks.

Which of the following is typically automated using computer-based tools? (Choose the
best answer?
a) A Security test
b) A penetration test
c) A vulnerability assessment
d) Shoulder surfing ✅A vulnerability assessment

Vulnerability assessment is an activity that security testers conduct in order to know
about potential systems' vulnerabilities before engaging in their testing. Penetration
testing involves probing or attacking a system in order to exploit potential vulnerabilities.
One of the differences between penetration testing and security testing is that security
testing involves analyzing a company's security policies in order to find potential
weaknesses that may jeopardize security.

Which of the following may not be included in a penetration test report?
a) How risks of exploiting exposures are rated
b) Recommendations about dealing with potential exposures
c) Technical details about vulnerabilities, and possible mitigation options
d) Details about attacks conducted
e) None of the above ✅None of the above

A ________________________ can help determine that a company's specific security
procedures are not implemented.
a) Penetration testing
b) Security testing
c) Vulnerability assessment
d) Only a and b ✅Security testing

An ethical hacker can launch a denial of service attack against a company's server.
a) True
b) False ✅True

During the last few months, almost all of InfoSec Inc.'s computers have been infected by
a malicious piece of software called Mytob. The malware was able to harvest email
addresses from the Windows address book. The malware primarily spread using its own
SMTP email engine. Mytob has the potential of deleting files on the infected computers
and seriously slowing down communication on the network by consuming the victims'
processing capacity. Which of the following best describes this malware?
a) A DoS attack

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller twishfrancis. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $8.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75323 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$8.99
  • (0)
  Add to cart