Certified Ethical Hacker v10 Practice Exam already graded A+
7 views 0 purchase
Course
Certified Ethical Hacker v10
Institution
Certified Ethical Hacker V10
Drawing of symbols in public places to publicize an open Wi-Fi wireless network is
called what? Correct answer- A. WarChalking
The act of altering configuration files and the expected operation of a service is known
as what kind of attack? Correct answer- C. Service Reconfiguration
ARP (Address...
certified ethical hacker v10 practice exam already graded a
drawing of symbols in public places to publicize an open wi fi wireless network is called what
the act of altering configuration files and
Written for
Certified Ethical Hacker v10
All documents for this subject (6)
Seller
Follow
EvaTee
Reviews received
Content preview
Certified Ethical Hacker v10 Practice
Exam
Drawing of symbols in public places to publicize an open Wi-Fi wireless network is
called what? Correct answer- A. WarChalking
The act of altering configuration files and the expected operation of a service is known
as what kind of attack? Correct answer- C. Service Reconfiguration
ARP (Address Resolution Protocol) does not translate IP addresses to MAC addresses.
Correct answer- FALSE
Which of the following is a business threat category? Correct answer- ALL OF THE
ABOVE
What does the term Hacktivism mean? Correct answer- C. Hackers who are hacking for
a cause.
OWASP's Top 10 IoT Vulnerabilities are provided to help developers, manufacturers,
enterprises and consumers make well-informed decisions when building and using IoT
devices. A user recently learns of a vulnerability in their web camera's software, which
allows an attacker to log in using default admin credentials to view the camera's video
feed. Which of OWASP's Top 10 IoT Vulnerabilities does this BEST fall under? Correct
answer- C. Weak, guessable, or hardcoded passwords
Patch management ensures appropriate patches are installed on all systems. Correct
answer- A. TRUE
Which of the following is a collection of Internet information gathering and network
troubleshooting utilities? Correct answer- C. NetScanTools Pro
Which of the following should organizations create as part of incident response
planning? Correct answer- D. All of the Above
Which of the following analyzes an operating system and all the applications on the
network to discover any security flaws that are present? Correct answer- C. GFI LAN
Guard
Port scanning tools enable a hacker to learn about services running on a host. Correct
answer- A. TRUE
All of the following can help protect yourself from Google Hacking EXCEPT: Correct
answer- C. Keep default pages and samples
, The vulnerabilities on OWASP's Top 10 IoT Vulnerabilities are categorized by what two
factors? Correct answer- D. Rate of occurrence and severity level
Which of the following is a "clean computing habit" for users? Correct answer- D. All of
the above
The HIPPA Privacy Rule regulates the use and disclosure of protected health
information. Correct answer- A. TRUE
Which of the following best represents the symptoms a host may have when infected by
a virus or worm? Correct answer- D. All of the above
Individuals who download and use scripts/exploit tools with no real understanding of the
concepts being employed in causing an effect are called? Correct answer- C. Script
Kiddies
Which of the following attacks exploit OS/application installations that contain scripts or
tools meant to help administrators be more efficient, but allow hackers access to
powerful tools already installed on the host? Correct answer- A. Shrink Wrap Code
Attacks
Which of the following is a common tool used for LDAP enumeration? Correct answer-
D. All of the above
How does a denial-of-service (DoS) attack operate? Correct answer- A. A hacker
prevents users from accessing a service.
The category of hijacking a session by intercepting, modifying and injecting packets
between client and server is described as: Correct answer- A. Network Hijacking
Which nmap command option performs a scan using the initial TCP handshake but
sends an RST instead of ACK? Correct answer- A. sS SYN Stealth Scan
Software or hardware which captures packets off the network is called: Correct answer-
A. Sniffer
Bills for unused services are a sign of identity theft. Correct answer- A. True
Gray Hat Hackers use their skills for both offensive and defensive purposes that are not
illegal or malicious and have approval to operate. Correct answer- A. TRUE
In a public key infrastructure the public key is used to unencrypt a message and sign
messages. Correct answer- B. FALSE
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller EvaTee. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.49. You're not tied to anything after your purchase.