100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Multiple choice Certified Ethical Hacker Book Questions and Correct Answers $8.99   Add to cart

Exam (elaborations)

Multiple choice Certified Ethical Hacker Book Questions and Correct Answers

 0 view  0 purchase
  • Course
  • Ethical Hacking
  • Institution
  • Ethical Hacking

If you have been contracted to perform an attack against a target system, you are what type of hacker? A. White hat B. Gray hat C. Black hat D. Red hat A. A white hat hacker always has permission to perform pen testing against a target system. Which of the following describes an attacker who goes ...

[Show more]

Preview 3 out of 17  pages

  • September 23, 2024
  • 17
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Ethical Hacking
  • Ethical Hacking
avatar-seller
twishfrancis
Multiple choice Certified Ethical Hacker
Book Questions and Correct Answers
If you have been contracted to perform an attack against a target system, you are what
type
of hacker?
A. White hat
B. Gray hat
C. Black hat
D. Red hat ✅A. A white hat hacker always has permission to perform pen testing
against a target system.

Which of the following describes an attacker who goes after a target to draw attention to
a
cause?
A. Terrorist
B. Criminal
C. Hacktivist
D. Script kiddie ✅C. A hacktivist is an individual or group that performs hacking and
other disruptive activities with the intention of drawing attention to a particular cause or
message.

What level of knowledge about hacking does a script kiddie have?
A. Low
B. Average
C. High
D. Advanced ✅A. Script kiddies have low or no knowledge of the hacking process but
should still be treated as dangerous.

Which of the following does an ethical hacker require to start evaluating a system?
A. Training
B. Permission
C. Planning
D. Nothing ✅B. An ethical hacker never performs their services against a target
without explicit permission of the owner of that system.

A white box test means the tester has which of the following?
A. No knowledge
B. Some knowledge
C. Complete knowledge
D. Permission ✅C. White box testers have complete knowledge of the environment
they have been tasked with attacking.

,Which of the following describes a hacker who attacks without regard for being caught
or
punished?
A. Hacktivist
B. Terrorist
C. Criminal
D. Suicide hacker ✅D. Much like suicide bombers in the real world, suicide hackers do
not worry about getting caught; they are concerned with their mission first.

Which of the following is the purpose of the footprinting process?
A. Entering a system
B. Covering tracks
C. Escalating privileges
D. Gathering information ✅D. Footprinting is used to gather information about a target
environment.

Which of the following forms are usually malicious?
A. Software applications
B. Scripts
C. Viruses
D. Grayware ✅C. Viruses are the oldest and best known form of malicious code or
malware.

What is a self-replicating piece of malware?
A. A worm
B. A virus
C. A Trojan horse
D. A rootkit ✅A. A worm is a self-replicating piece of malware that does not require
user interaction to proceed.

What is a piece of malware that relies on social engineering?
A. A worm
B. A virus
C. A Trojan horse
D. A rootkit ✅C. A Trojan horse relies more on social engineering than on technology
to be successful.

Which of the following best describes what a hacktivist does?
A. Defaces websites
B. Performs social engineering
C. Hacks for political reasons
D. Hacks with basic skills ✅C. A hacktivist engages in mischief for political reasons.

Which of the following best describes what a suicide hacker does?
A. Hacks with permission
B. Hacks without stealth

, C. Hacks without permission
D. Hacks with stealth ✅B. A suicide hacker does not worry about stealth or otherwise
concealing their activities but is more concerned with forwarding an agenda.

Which type of hacker may use their skills for both benign and malicious goals at
different
times?
A. White Hat
B. Gray Hat
C. Black Hat
D. Suicide Attackers ✅B. Grey hat hackers are typically thought of as those that were
formally black hats, but have reformed. However they have been known to use their
skills for both benign and malicious purposes.

What separates a suicide hacker from other attackers?
A. A disregard for the law
B. A desire to be helpful
C. The intent to reform
D. A lack of fear of being caught ✅D. A suicide hacker?s main difference over other
hacker?s is their complete and utter lack of concern in regards to being caught.

Which of the following would most likely engage in the pursuit of vulnerability research?
A. White Hat
B. Gray Hat
C. Black Hat
D. Suicide ✅A. White hat hackers are the most likely to engage in research activities;
though grey and black hats may engage in these activities they are not typical.

Vulnerability research deals with which of the following?
A. Actively uncovering vulnerabilities
B. Passively uncovering vulnerabilities
C. Testing theories
D. Applying security guidance ✅B. Vulnerability research is a way of passively
uncovering weaknesses.

How is black box testing performed?
A. With no knowledge
B. With full knowledge
C. With partial knowledge
D. By a black hat ✅A. Black box testing is performed with no knowledge to simulate an
actual view of what a hacker would have.

A contract is important because it does what?
A. Gives permission
B. Gives test parameters
C. Gives proof

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller twishfrancis. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $8.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

74735 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$8.99
  • (0)
  Add to cart