100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Certified Ethical Hacker v10 Practice Exam already graded A+ $13.49   Add to cart

Exam (elaborations)

Certified Ethical Hacker v10 Practice Exam already graded A+

 7 views  0 purchase
  • Course
  • Institution

Drawing of symbols in public places to publicize an open Wi-Fi wireless network is called what? Correct answer- A. WarChalking The act of altering configuration files and the expected operation of a service is known as what kind of attack? Correct answer- C. Service Reconfiguration ARP (Address...

[Show more]

Preview 2 out of 5  pages

  • April 8, 2022
  • 5
  • 2021/2022
  • Exam (elaborations)
  • Questions & answers
avatar-seller
Certified Ethical Hacker v10 Practice
Exam
Drawing of symbols in public places to publicize an open Wi-Fi wireless network is
called what? Correct answer- A. WarChalking

The act of altering configuration files and the expected operation of a service is known
as what kind of attack? Correct answer- C. Service Reconfiguration

ARP (Address Resolution Protocol) does not translate IP addresses to MAC addresses.
Correct answer- FALSE

Which of the following is a business threat category? Correct answer- ALL OF THE
ABOVE

What does the term Hacktivism mean? Correct answer- C. Hackers who are hacking for
a cause.

OWASP's Top 10 IoT Vulnerabilities are provided to help developers, manufacturers,
enterprises and consumers make well-informed decisions when building and using IoT
devices. A user recently learns of a vulnerability in their web camera's software, which
allows an attacker to log in using default admin credentials to view the camera's video
feed. Which of OWASP's Top 10 IoT Vulnerabilities does this BEST fall under? Correct
answer- C. Weak, guessable, or hardcoded passwords

Patch management ensures appropriate patches are installed on all systems. Correct
answer- A. TRUE

Which of the following is a collection of Internet information gathering and network
troubleshooting utilities? Correct answer- C. NetScanTools Pro

Which of the following should organizations create as part of incident response
planning? Correct answer- D. All of the Above

Which of the following analyzes an operating system and all the applications on the
network to discover any security flaws that are present? Correct answer- C. GFI LAN
Guard

Port scanning tools enable a hacker to learn about services running on a host. Correct
answer- A. TRUE

All of the following can help protect yourself from Google Hacking EXCEPT: Correct
answer- C. Keep default pages and samples

, The vulnerabilities on OWASP's Top 10 IoT Vulnerabilities are categorized by what two
factors? Correct answer- D. Rate of occurrence and severity level

Which of the following is a "clean computing habit" for users? Correct answer- D. All of
the above

The HIPPA Privacy Rule regulates the use and disclosure of protected health
information. Correct answer- A. TRUE

Which of the following best represents the symptoms a host may have when infected by
a virus or worm? Correct answer- D. All of the above

Individuals who download and use scripts/exploit tools with no real understanding of the
concepts being employed in causing an effect are called? Correct answer- C. Script
Kiddies

Which of the following attacks exploit OS/application installations that contain scripts or
tools meant to help administrators be more efficient, but allow hackers access to
powerful tools already installed on the host? Correct answer- A. Shrink Wrap Code
Attacks

Which of the following is a common tool used for LDAP enumeration? Correct answer-
D. All of the above

How does a denial-of-service (DoS) attack operate? Correct answer- A. A hacker
prevents users from accessing a service.

The category of hijacking a session by intercepting, modifying and injecting packets
between client and server is described as: Correct answer- A. Network Hijacking

Which nmap command option performs a scan using the initial TCP handshake but
sends an RST instead of ACK? Correct answer- A. sS SYN Stealth Scan

Software or hardware which captures packets off the network is called: Correct answer-
A. Sniffer

Bills for unused services are a sign of identity theft. Correct answer- A. True

Gray Hat Hackers use their skills for both offensive and defensive purposes that are not
illegal or malicious and have approval to operate. Correct answer- A. TRUE

In a public key infrastructure the public key is used to unencrypt a message and sign
messages. Correct answer- B. FALSE

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller EvaTee. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $13.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75323 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$13.49
  • (0)
  Add to cart