100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Ethical Hacking Module 3 Exam Questions and Answers $12.39   Add to cart

Exam (elaborations)

Ethical Hacking Module 3 Exam Questions and Answers

 7 views  0 purchase
  • Course
  • Ethical Hacking
  • Institution
  • Ethical Hacking

Ethical Hacking Module 3 Exam Questions and Answers Which of the following best describes an insider attacker? A good guy who tries to help a company see their vulnerabilities An agent who uses their technical knowledge to bypass security An unintentional threat actor; the most common thre...

[Show more]

Preview 2 out of 6  pages

  • August 21, 2024
  • 6
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Ethical Hacking
  • Ethical Hacking
avatar-seller
Perfectscorer
Ethical Hacking Module 3 Exam
Questions and Answers

Which of the following best describes an insider attacker?

A good guy who tries to help a company see their vulnerabilities
An agent who uses their technical knowledge to bypass security
An unintentional threat actor; the most common threat
An attacker with lots of resources and money at their disposal - Answer-An unintentional
threat actor; the most common threat

Compliments, misinformation, feigning ignorance, and being a good listener are tactics
of which social engineering technique?

Elictitation
Interrogation
Preloading
Impersonation - Answer-Elictitation

You get a call from one of your best customers. The customer is asking about your
company's employees, teams, and managers. what should you do?

You should provide the information as part of quality customer service
You should put the caller on hold and then hang up
You should not provide any information and forward the call to the help desk
You should not provide any information except your manager's name and number -
Answer-You should not provide any information and forward the call to the help desk

Jason is at home, attempting to access the website for his music store. When he goes
to the website, it has a simple form asking for name, email, and phone number. This is
not the music store website. Jason is sure the website has been hacked. How did the
attacker accomplish this hack?

Feigning ignorance
Host file modification
DNS cache poisoning
Social networking - Answer-DNS cache poisoning

An attack that targets senior executives and high-profile victims is referred to as:

Pharming

, Scrubbing
Vishing
Whaling - Answer-Whaling

You are a security consultant and have been hired to evaluate an organization's
physical security practices. All employees must pass through a locked door to enter the
main work area. Access is restricted using a biometric fingerprint lock.
A receptionist is located next to the locked door in the reception area. She uses an iPad
application to log any security events that may occur. She also uses her iPad to
complete work tasks as assigned by the organization's CEO.
What could you do to add an additional layer of security to this organization?

Require users to use workstation screensaver passwords
Train the receptionist to keep her iPad in a locked drawer
Move the receptionist's desk into the secured area
Replace the biometric locks with smart cards - Answer-Train the receptionist to keep her
iPad in a locked drawer

While reviewing video files from your organization's security cameras, you notice a
suspicious person using piggybacking to gain access to your building. The individual in
question did not have a security badge.
Which of the following would you most likely implement to keep this from happening in
the future?

Anti-passback
Scrubbing
Cable locks
Mantraps - Answer-Mantraps

Implementing emergency lighting that runs on protected power and automatically
switches on when the main power goes off is part of which physical control?

Physical access controls
Perimeter barriers
Physical access logs
Employee and visitor safety - Answer-Employee and visitor safety

Closed-circuit television can be used as both a preventative tool (to monitor live events)
or as an investigative tool (to record events for later playback). Which camera is more
vandal-resistant than other cameras?

A Pan Tilt Zoom camera
A bullet camera
A dome camera
A c-mount camera - Answer-A dome camera

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Perfectscorer. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.39. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

62890 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.39
  • (0)
  Add to cart