Topic 1, Introduction to Ethical Hacking
Where should a security tester be looking for information that could be used by an
attacker against an organization? (Select all that apply)
A.
CHAT rooms
B.
WHOIS database
C.
News groups
D.
Web sites
E.
Search engines
F.
Organization’s own web site
CHAT rooms
WHOIS database
News groups
Web sites
Search engines
Organization’s own web site
Explanation: A Security tester should search for information everywhere that he/she can
access. You never know where you find that small piece of information that could penetrate
a strong defense.
Steven works as a security consultant and frequently performs penetration tests for
Fortune 500 companies. Steven runs external and internal tests and then creates
reports to show the companies where their weak areas are. Steven always signs a
non-disclosure agreement before performing his tests. What would Steven be
considered?
A.
Whitehat Hacker
B.
BlackHat Hacker
C.
Grayhat Hacker
D.
Bluehat Hacker
Whitehat Hacker
Explanation: A white hat hacker, also rendered as ethical hacker, is, in the realm of
information technology, a person who is ethically opposed to the abuse of computer
systems. Realization that the Internet now represents human voices from around the world
has made the defense of its integrity an important pastime for many. A white hat generally
focuses on securing IT systems, whereas a black hat (the opposite) would like to break into
them.
What are the two basic types of attacks?(Choose two.)
A.
DoS
B.
Passive
C.
Sniffing
D.
Active
E.
Cracking
Passive
Active
Explanation: Passive and active attacks are the two basic types of attacks.
Which of the following best describes Vulnerability?
A.
The loss potential of a threat
B.
An action or event that might prejudice security
C.
An agent that could take advantage of a weakness
D.
A weakness or error that can lead to compromise
A weakness or error that can lead to compromise
Explanation: A vulnerability is a flaw or weakness in system security procedures, design
or implementation that could be exercised (accidentally triggered or intentionally exploited)
and result in a harm to an IT system or activity.
What does the term “Ethical Hacking” mean?
A.
Someone who is hacking for ethical reasons.
B.
Someone who is using his/her skills for ethical reasons.
C.
Someone who is using his/her skills for defensive purposes.
D.
Someone who is using his/her skills for offensive purposes.
Someone who is using his/her skills for defensive purposes.
Explanation: Ethical hacking is only about defending your self or your employer against
malicious persons by using the same techniques and skills.
Page 1 out of 153 Pages |