100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Ethical Hacking Quizzes 1-10 Study Questions and Correct Answers CA$17.41   Add to cart

Exam (elaborations)

Ethical Hacking Quizzes 1-10 Study Questions and Correct Answers

 6 views  0 purchase
  • Course
  • Ethical Hacking
  • Institution
  • Ethical Hacking

A major difference between a hacker and an ethical hacker is the: a) level of technological proficiency each has accomplished. b) social position each has reached. c) education level each has obtained. d) code of ethics to which each subscribes. d) code of ethics to which each subscribes. Breaking...

[Show more]

Preview 4 out of 32  pages

  • September 24, 2024
  • 32
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Ethical Hacking
  • Ethical Hacking
avatar-seller
Ethical Hacking Quizzes 1-10 Study
Questions and Correct Answers
A major difference between a hacker and an ethical hacker is the:
a) level of technological proficiency each has accomplished.
b) social position each has reached.
c) education level each has obtained.
d) code of ethics to which each subscribes. ✅d) code of ethics to which each
subscribes.

Breaking the trust of the client has placed in the ethical hacker can lead to the:
a) rules of engagement having to be rewritten.
b) planning stage being deemed incomplete.
c) failure of the testing results to accurately portray the organization's assets.
d) question of other details, such as the result of the test. ✅d) question of other details
such as the result of the test.

During the planning phase of a penetration test, the aim should be to:
a) perform the attack and measure the results.
b) report the results of the attack to the organization.
c) research applicable state and federal regulations that apply to the proposed tests.
d)determine why a penetration test and its associated tasks are necessary. ✅d)
determine why a penetration test and its associated tasks are necessary.

Planning, discovery, attack, and reporting are considered:
a) intrusion detection steps.
b) hacking steps.
c) ethical hacking steps.
d) auditing steps. ✅c) ethical hacking steps

What type of penetration testing is most often used when an organization wants to
closely simulate how an attacker views a system?
a) Black-box testing
b) Black-hat testing
c) White-hat testing
d) White-box testing ✅a) Black-box testing

Which of the following is NOT considered on the the three types of controls you can use
in risk mitigation?
a) Administrative
b) Technical
c) Physical
d) Distribution ✅d) Distribution

,Which of the following refers to a pieces of software, a tool, or a technique that targets
or takes advantage of a vulnerability?
a) Asset
b) Exploit
c) Authentication
d) Hacker ✅b) Exploit

Which of the following refers to the structured and methodical means of investigating,
uncovering, attacking, and reporting on a target system's strengths and vulnerabilities?
a) Authentication
b) Penetration testing
c) Ethical evaluation
c) Hacktivism ✅b) Penetration testing

Which of the following tests includes anything that targets equipment or facilities and
can also include actions against people, such as social engineering-related threats?
a) Administrative attack
b) Assessment attack
c) Technical attack
d) Physical attack ✅d) Physical attack

Which of the following tests is designed to simulate an attack against technology from
either the inside or the outside depending on the goals and intentions of the client?
a) Assessment attack
b) Technical attack
c) Physical attack
d) Administrative attack ✅b) Technical attack

A hierarchical system of servers and services specifically designed to translate IP
addresses into domain names (forward lookups) as well as revers (reverse lookups_ is
called?
a) a sniffer.
b) Domain Name Service (DNS).
c) User Datagram Protocol (UDP).
d) a packet filter. ✅b) Domain Name Service (DNS).

Blocking everything and allowing only what is needed is known as:
a) the deny-all principle.
b) the blocking principle.
c) encapsulation.
d) port scanning. ✅a) the deny-all principle.

Repeaters, hubs, bridges, and switches are part of:
a) Network and Internet Layer equipment
b) Host-to-Host Layer equipment
c) Physical or Network Access Layer equipment

,d) Application Layer equipment ✅c) Physical or Network Access Layer equipment

The act of a third party covertly monitoring Internet and telephone conversations is
called:
a) eavesdropping.
b) spoofing.
c) interception.
d) wiretapping. ✅d) wiretapping.

Which of the following is a connection-less protocol that offers speed and low overhead
as its primary advantage?
a) Layer 2 Tunneling Protocol
b) Serial Line Interface Protocol
c) User Datagram Protocol
d) Reverse Address Resolution Protocol ✅c) User Datagram Protocol

Which of the following is a largely obsolete protocol that was originally designed for the
use in the connections established by modems?
a) Serial Line Interface Protocol
b) Reverse Address Resolution Protocol
c) Layer 2 Tunneling Protocol
d) User Datagram Protocol ✅a) Serial Line Interface Protocol

Which of the following is method of separating a network into segments for better
management and performance?
a) Teardrop
b) Frame
c) Subnet mask
d) Sniffer ✅c) Subnet mask

Which of the following offers the greatest level of security for wireless networks?
a) Wi-Fi Protected Access 2 (WPA2)
b) Wi-Fi Protected Access (WPA)
c) WIred Equivalent Privacy (WEP)
d) Wi-Fi Protected Access 3 (WPA3) ✅a) Wi-Fi Protected Access 2 (WPA2)

Which of the following regulates the flow of traffic between different networks?
a) A firewall
b) A frame
c) A sniffer
d) Encapsulation ✅a) A firewall

Which routing protocol calculates the best path to a target network by one or more
metrics such as delay, speed, or bandwidth?
a) Static

, b) Broadcast
c) Distance vector
d) Link state ✅d) Link state

A hash algorithm can be compromised with a collision, which occurs when two separate
and different messages or inputs pass through the hashing process and generate:
a) values so different that they appear to be an attack.
b) the same value.
c) similar values.
d) values that are not prime numbers. ✅b) the same value.

A one-way hashing function is designed to be:
a) difficult to compute as well as undo or reverse.
b) relatively easy to compute as well as undo or reverse.
c) relatively easy to compute one way, but hard to undo or reverse.
d) difficult to compute one way, but easy to undo or reverse. ✅c) relatively easy to
compute one way, but easy to undo or reverse.

Cryptography provides an invaluable service to security by providing all of the following
except:
a) a means to safeguard information against unauthorized disclosure.
b) a means to detect modification of information.
c) the ability to have confidence as to the true origin of information through what is
known as nonrepudiation.
d) the ability to hack into systems and remain undetected. ✅d) the ability to hack into
systems and remain undetected.

Digital certificates:
a) cannot be used as legal tender
b) provide a list of certificates that have been revoked.
c) determine key lifetime.
d) provide a form of identification on the Internet and in other areas. ✅d) provide a
form of identification on the Internet and in other areas.

In using symmetric encryption to encrypt a given pieces of information, there are two
different mechanisms an algorithm can use, either:
a) voice or audio.
b) cleartext or plaintext.
c) a stream cipher or a block cipher.
d) A Caesar cipher or ciphertext. ✅c) a stream cipher or a block cipher.

Message Security Protocol (MSP), Secure Shell (SSH), and Secure Hypertext Transfer
Protocol (S-HTTP) are:
a) forms of brute-force password attacks.
b) common cryptographic systems.
c) common hashing algorithms.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller twishfrancis. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for CA$17.41. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

77254 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
CA$17.41
  • (0)
  Add to cart