Garantie de satisfaction à 100% Disponible immédiatement après paiement En ligne et en PDF Tu n'es attaché à rien
logo-home
Ethical Hacking Quizzes 1-10 Study Questions and Correct Answers €11,70   Ajouter au panier

Examen

Ethical Hacking Quizzes 1-10 Study Questions and Correct Answers

 6 vues  0 fois vendu
  • Cours
  • Ethical Hacking
  • Établissement
  • Ethical Hacking

A major difference between a hacker and an ethical hacker is the: a) level of technological proficiency each has accomplished. b) social position each has reached. c) education level each has obtained. d) code of ethics to which each subscribes. d) code of ethics to which each subscribes. Breaking...

[Montrer plus]

Aperçu 4 sur 32  pages

  • 24 septembre 2024
  • 32
  • 2024/2025
  • Examen
  • Questions et réponses
  • Ethical Hacking
  • Ethical Hacking
avatar-seller
Ethical Hacking Quizzes 1-10 Study
Questions and Correct Answers
A major difference between a hacker and an ethical hacker is the:
a) level of technological proficiency each has accomplished.
b) social position each has reached.
c) education level each has obtained.
d) code of ethics to which each subscribes. ✅d) code of ethics to which each
subscribes.

Breaking the trust of the client has placed in the ethical hacker can lead to the:
a) rules of engagement having to be rewritten.
b) planning stage being deemed incomplete.
c) failure of the testing results to accurately portray the organization's assets.
d) question of other details, such as the result of the test. ✅d) question of other details
such as the result of the test.

During the planning phase of a penetration test, the aim should be to:
a) perform the attack and measure the results.
b) report the results of the attack to the organization.
c) research applicable state and federal regulations that apply to the proposed tests.
d)determine why a penetration test and its associated tasks are necessary. ✅d)
determine why a penetration test and its associated tasks are necessary.

Planning, discovery, attack, and reporting are considered:
a) intrusion detection steps.
b) hacking steps.
c) ethical hacking steps.
d) auditing steps. ✅c) ethical hacking steps

What type of penetration testing is most often used when an organization wants to
closely simulate how an attacker views a system?
a) Black-box testing
b) Black-hat testing
c) White-hat testing
d) White-box testing ✅a) Black-box testing

Which of the following is NOT considered on the the three types of controls you can use
in risk mitigation?
a) Administrative
b) Technical
c) Physical
d) Distribution ✅d) Distribution

,Which of the following refers to a pieces of software, a tool, or a technique that targets
or takes advantage of a vulnerability?
a) Asset
b) Exploit
c) Authentication
d) Hacker ✅b) Exploit

Which of the following refers to the structured and methodical means of investigating,
uncovering, attacking, and reporting on a target system's strengths and vulnerabilities?
a) Authentication
b) Penetration testing
c) Ethical evaluation
c) Hacktivism ✅b) Penetration testing

Which of the following tests includes anything that targets equipment or facilities and
can also include actions against people, such as social engineering-related threats?
a) Administrative attack
b) Assessment attack
c) Technical attack
d) Physical attack ✅d) Physical attack

Which of the following tests is designed to simulate an attack against technology from
either the inside or the outside depending on the goals and intentions of the client?
a) Assessment attack
b) Technical attack
c) Physical attack
d) Administrative attack ✅b) Technical attack

A hierarchical system of servers and services specifically designed to translate IP
addresses into domain names (forward lookups) as well as revers (reverse lookups_ is
called?
a) a sniffer.
b) Domain Name Service (DNS).
c) User Datagram Protocol (UDP).
d) a packet filter. ✅b) Domain Name Service (DNS).

Blocking everything and allowing only what is needed is known as:
a) the deny-all principle.
b) the blocking principle.
c) encapsulation.
d) port scanning. ✅a) the deny-all principle.

Repeaters, hubs, bridges, and switches are part of:
a) Network and Internet Layer equipment
b) Host-to-Host Layer equipment
c) Physical or Network Access Layer equipment

,d) Application Layer equipment ✅c) Physical or Network Access Layer equipment

The act of a third party covertly monitoring Internet and telephone conversations is
called:
a) eavesdropping.
b) spoofing.
c) interception.
d) wiretapping. ✅d) wiretapping.

Which of the following is a connection-less protocol that offers speed and low overhead
as its primary advantage?
a) Layer 2 Tunneling Protocol
b) Serial Line Interface Protocol
c) User Datagram Protocol
d) Reverse Address Resolution Protocol ✅c) User Datagram Protocol

Which of the following is a largely obsolete protocol that was originally designed for the
use in the connections established by modems?
a) Serial Line Interface Protocol
b) Reverse Address Resolution Protocol
c) Layer 2 Tunneling Protocol
d) User Datagram Protocol ✅a) Serial Line Interface Protocol

Which of the following is method of separating a network into segments for better
management and performance?
a) Teardrop
b) Frame
c) Subnet mask
d) Sniffer ✅c) Subnet mask

Which of the following offers the greatest level of security for wireless networks?
a) Wi-Fi Protected Access 2 (WPA2)
b) Wi-Fi Protected Access (WPA)
c) WIred Equivalent Privacy (WEP)
d) Wi-Fi Protected Access 3 (WPA3) ✅a) Wi-Fi Protected Access 2 (WPA2)

Which of the following regulates the flow of traffic between different networks?
a) A firewall
b) A frame
c) A sniffer
d) Encapsulation ✅a) A firewall

Which routing protocol calculates the best path to a target network by one or more
metrics such as delay, speed, or bandwidth?
a) Static

, b) Broadcast
c) Distance vector
d) Link state ✅d) Link state

A hash algorithm can be compromised with a collision, which occurs when two separate
and different messages or inputs pass through the hashing process and generate:
a) values so different that they appear to be an attack.
b) the same value.
c) similar values.
d) values that are not prime numbers. ✅b) the same value.

A one-way hashing function is designed to be:
a) difficult to compute as well as undo or reverse.
b) relatively easy to compute as well as undo or reverse.
c) relatively easy to compute one way, but hard to undo or reverse.
d) difficult to compute one way, but easy to undo or reverse. ✅c) relatively easy to
compute one way, but easy to undo or reverse.

Cryptography provides an invaluable service to security by providing all of the following
except:
a) a means to safeguard information against unauthorized disclosure.
b) a means to detect modification of information.
c) the ability to have confidence as to the true origin of information through what is
known as nonrepudiation.
d) the ability to hack into systems and remain undetected. ✅d) the ability to hack into
systems and remain undetected.

Digital certificates:
a) cannot be used as legal tender
b) provide a list of certificates that have been revoked.
c) determine key lifetime.
d) provide a form of identification on the Internet and in other areas. ✅d) provide a
form of identification on the Internet and in other areas.

In using symmetric encryption to encrypt a given pieces of information, there are two
different mechanisms an algorithm can use, either:
a) voice or audio.
b) cleartext or plaintext.
c) a stream cipher or a block cipher.
d) A Caesar cipher or ciphertext. ✅c) a stream cipher or a block cipher.

Message Security Protocol (MSP), Secure Shell (SSH), and Secure Hypertext Transfer
Protocol (S-HTTP) are:
a) forms of brute-force password attacks.
b) common cryptographic systems.
c) common hashing algorithms.

Les avantages d'acheter des résumés chez Stuvia:

Qualité garantie par les avis des clients

Qualité garantie par les avis des clients

Les clients de Stuvia ont évalués plus de 700 000 résumés. C'est comme ça que vous savez que vous achetez les meilleurs documents.

L’achat facile et rapide

L’achat facile et rapide

Vous pouvez payer rapidement avec iDeal, carte de crédit ou Stuvia-crédit pour les résumés. Il n'y a pas d'adhésion nécessaire.

Focus sur l’essentiel

Focus sur l’essentiel

Vos camarades écrivent eux-mêmes les notes d’étude, c’est pourquoi les documents sont toujours fiables et à jour. Cela garantit que vous arrivez rapidement au coeur du matériel.

Foire aux questions

Qu'est-ce que j'obtiens en achetant ce document ?

Vous obtenez un PDF, disponible immédiatement après votre achat. Le document acheté est accessible à tout moment, n'importe où et indéfiniment via votre profil.

Garantie de remboursement : comment ça marche ?

Notre garantie de satisfaction garantit que vous trouverez toujours un document d'étude qui vous convient. Vous remplissez un formulaire et notre équipe du service client s'occupe du reste.

Auprès de qui est-ce que j'achète ce résumé ?

Stuvia est une place de marché. Alors, vous n'achetez donc pas ce document chez nous, mais auprès du vendeur twishfrancis. Stuvia facilite les paiements au vendeur.

Est-ce que j'aurai un abonnement?

Non, vous n'achetez ce résumé que pour €11,70. Vous n'êtes lié à rien après votre achat.

Peut-on faire confiance à Stuvia ?

4.6 étoiles sur Google & Trustpilot (+1000 avis)

79202 résumés ont été vendus ces 30 derniers jours

Fondée en 2010, la référence pour acheter des résumés depuis déjà 14 ans

Commencez à vendre!
€11,70
  • (0)
  Ajouter