Garantie de satisfaction à 100% Disponible immédiatement après paiement En ligne et en PDF Tu n'es attaché à rien
logo-home
Ethical Hacking Module 3 Exam Questions and Answers €12,02   Ajouter au panier

Examen

Ethical Hacking Module 3 Exam Questions and Answers

 6 vues  0 fois vendu
  • Cours
  • Ethical Hacking
  • Établissement
  • Ethical Hacking

Ethical Hacking Module 3 Exam Questions and Answers Which of the following best describes an insider attacker? A good guy who tries to help a company see their vulnerabilities An agent who uses their technical knowledge to bypass security An unintentional threat actor; the most common thre...

[Montrer plus]

Aperçu 2 sur 6  pages

  • 21 août 2024
  • 6
  • 2024/2025
  • Examen
  • Questions et réponses
  • Ethical Hacking
  • Ethical Hacking
avatar-seller
Ethical Hacking Module 3 Exam
Questions and Answers

Which of the following best describes an insider attacker?

A good guy who tries to help a company see their vulnerabilities
An agent who uses their technical knowledge to bypass security
An unintentional threat actor; the most common threat
An attacker with lots of resources and money at their disposal - Answer-An unintentional
threat actor; the most common threat

Compliments, misinformation, feigning ignorance, and being a good listener are tactics
of which social engineering technique?

Elictitation
Interrogation
Preloading
Impersonation - Answer-Elictitation

You get a call from one of your best customers. The customer is asking about your
company's employees, teams, and managers. what should you do?

You should provide the information as part of quality customer service
You should put the caller on hold and then hang up
You should not provide any information and forward the call to the help desk
You should not provide any information except your manager's name and number -
Answer-You should not provide any information and forward the call to the help desk

Jason is at home, attempting to access the website for his music store. When he goes
to the website, it has a simple form asking for name, email, and phone number. This is
not the music store website. Jason is sure the website has been hacked. How did the
attacker accomplish this hack?

Feigning ignorance
Host file modification
DNS cache poisoning
Social networking - Answer-DNS cache poisoning

An attack that targets senior executives and high-profile victims is referred to as:

Pharming

, Scrubbing
Vishing
Whaling - Answer-Whaling

You are a security consultant and have been hired to evaluate an organization's
physical security practices. All employees must pass through a locked door to enter the
main work area. Access is restricted using a biometric fingerprint lock.
A receptionist is located next to the locked door in the reception area. She uses an iPad
application to log any security events that may occur. She also uses her iPad to
complete work tasks as assigned by the organization's CEO.
What could you do to add an additional layer of security to this organization?

Require users to use workstation screensaver passwords
Train the receptionist to keep her iPad in a locked drawer
Move the receptionist's desk into the secured area
Replace the biometric locks with smart cards - Answer-Train the receptionist to keep her
iPad in a locked drawer

While reviewing video files from your organization's security cameras, you notice a
suspicious person using piggybacking to gain access to your building. The individual in
question did not have a security badge.
Which of the following would you most likely implement to keep this from happening in
the future?

Anti-passback
Scrubbing
Cable locks
Mantraps - Answer-Mantraps

Implementing emergency lighting that runs on protected power and automatically
switches on when the main power goes off is part of which physical control?

Physical access controls
Perimeter barriers
Physical access logs
Employee and visitor safety - Answer-Employee and visitor safety

Closed-circuit television can be used as both a preventative tool (to monitor live events)
or as an investigative tool (to record events for later playback). Which camera is more
vandal-resistant than other cameras?

A Pan Tilt Zoom camera
A bullet camera
A dome camera
A c-mount camera - Answer-A dome camera

Les avantages d'acheter des résumés chez Stuvia:

Qualité garantie par les avis des clients

Qualité garantie par les avis des clients

Les clients de Stuvia ont évalués plus de 700 000 résumés. C'est comme ça que vous savez que vous achetez les meilleurs documents.

L’achat facile et rapide

L’achat facile et rapide

Vous pouvez payer rapidement avec iDeal, carte de crédit ou Stuvia-crédit pour les résumés. Il n'y a pas d'adhésion nécessaire.

Focus sur l’essentiel

Focus sur l’essentiel

Vos camarades écrivent eux-mêmes les notes d’étude, c’est pourquoi les documents sont toujours fiables et à jour. Cela garantit que vous arrivez rapidement au coeur du matériel.

Foire aux questions

Qu'est-ce que j'obtiens en achetant ce document ?

Vous obtenez un PDF, disponible immédiatement après votre achat. Le document acheté est accessible à tout moment, n'importe où et indéfiniment via votre profil.

Garantie de remboursement : comment ça marche ?

Notre garantie de satisfaction garantit que vous trouverez toujours un document d'étude qui vous convient. Vous remplissez un formulaire et notre équipe du service client s'occupe du reste.

Auprès de qui est-ce que j'achète ce résumé ?

Stuvia est une place de marché. Alors, vous n'achetez donc pas ce document chez nous, mais auprès du vendeur Perfectscorer. Stuvia facilite les paiements au vendeur.

Est-ce que j'aurai un abonnement?

Non, vous n'achetez ce résumé que pour €12,02. Vous n'êtes lié à rien après votre achat.

Peut-on faire confiance à Stuvia ?

4.6 étoiles sur Google & Trustpilot (+1000 avis)

81113 résumés ont été vendus ces 30 derniers jours

Fondée en 2010, la référence pour acheter des résumés depuis déjà 14 ans

Commencez à vendre!
€12,02
  • (0)
  Ajouter