Ethical Hacking Module 3 Exam Questions and Answers
7 keer bekeken 0 keer verkocht
Vak
Ethical Hacking
Instelling
Ethical Hacking
Ethical Hacking Module 3 Exam Questions and Answers
Which of the following best describes an insider attacker?
A good guy who tries to help a company see their vulnerabilities
An agent who uses their technical knowledge to bypass security
An unintentional threat actor; the most common thre...
ethical hacking module 3 exam questions and answer
Geschreven voor
Ethical Hacking
Ethical Hacking
Verkoper
Volgen
Perfectscorer
Ontvangen beoordelingen
Voorbeeld van de inhoud
Ethical Hacking Module 3 Exam
Questions and Answers
Which of the following best describes an insider attacker?
A good guy who tries to help a company see their vulnerabilities
An agent who uses their technical knowledge to bypass security
An unintentional threat actor; the most common threat
An attacker with lots of resources and money at their disposal - Answer-An unintentional
threat actor; the most common threat
Compliments, misinformation, feigning ignorance, and being a good listener are tactics
of which social engineering technique?
You get a call from one of your best customers. The customer is asking about your
company's employees, teams, and managers. what should you do?
You should provide the information as part of quality customer service
You should put the caller on hold and then hang up
You should not provide any information and forward the call to the help desk
You should not provide any information except your manager's name and number -
Answer-You should not provide any information and forward the call to the help desk
Jason is at home, attempting to access the website for his music store. When he goes
to the website, it has a simple form asking for name, email, and phone number. This is
not the music store website. Jason is sure the website has been hacked. How did the
attacker accomplish this hack?
Feigning ignorance
Host file modification
DNS cache poisoning
Social networking - Answer-DNS cache poisoning
An attack that targets senior executives and high-profile victims is referred to as:
Pharming
, Scrubbing
Vishing
Whaling - Answer-Whaling
You are a security consultant and have been hired to evaluate an organization's
physical security practices. All employees must pass through a locked door to enter the
main work area. Access is restricted using a biometric fingerprint lock.
A receptionist is located next to the locked door in the reception area. She uses an iPad
application to log any security events that may occur. She also uses her iPad to
complete work tasks as assigned by the organization's CEO.
What could you do to add an additional layer of security to this organization?
Require users to use workstation screensaver passwords
Train the receptionist to keep her iPad in a locked drawer
Move the receptionist's desk into the secured area
Replace the biometric locks with smart cards - Answer-Train the receptionist to keep her
iPad in a locked drawer
While reviewing video files from your organization's security cameras, you notice a
suspicious person using piggybacking to gain access to your building. The individual in
question did not have a security badge.
Which of the following would you most likely implement to keep this from happening in
the future?
Implementing emergency lighting that runs on protected power and automatically
switches on when the main power goes off is part of which physical control?
Physical access controls
Perimeter barriers
Physical access logs
Employee and visitor safety - Answer-Employee and visitor safety
Closed-circuit television can be used as both a preventative tool (to monitor live events)
or as an investigative tool (to record events for later playback). Which camera is more
vandal-resistant than other cameras?
A Pan Tilt Zoom camera
A bullet camera
A dome camera
A c-mount camera - Answer-A dome camera
Voordelen van het kopen van samenvattingen bij Stuvia op een rij:
Verzekerd van kwaliteit door reviews
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Snel en makkelijk kopen
Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.
Focus op de essentie
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Veelgestelde vragen
Wat krijg ik als ik dit document koop?
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Tevredenheidsgarantie: hoe werkt dat?
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Van wie koop ik deze samenvatting?
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper Perfectscorer. Stuvia faciliteert de betaling aan de verkoper.
Zit ik meteen vast aan een abonnement?
Nee, je koopt alleen deze samenvatting voor €12,07. Je zit daarna nergens aan vast.