100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
Ethical Hacking Module 3 Exam Questions and Answers €12,07   In winkelwagen

Tentamen (uitwerkingen)

Ethical Hacking Module 3 Exam Questions and Answers

 7 keer bekeken  0 keer verkocht
  • Vak
  • Ethical Hacking
  • Instelling
  • Ethical Hacking

Ethical Hacking Module 3 Exam Questions and Answers Which of the following best describes an insider attacker? A good guy who tries to help a company see their vulnerabilities An agent who uses their technical knowledge to bypass security An unintentional threat actor; the most common thre...

[Meer zien]

Voorbeeld 2 van de 6  pagina's

  • 21 augustus 2024
  • 6
  • 2024/2025
  • Tentamen (uitwerkingen)
  • Vragen en antwoorden
  • Ethical Hacking
  • Ethical Hacking
avatar-seller
Ethical Hacking Module 3 Exam
Questions and Answers

Which of the following best describes an insider attacker?

A good guy who tries to help a company see their vulnerabilities
An agent who uses their technical knowledge to bypass security
An unintentional threat actor; the most common threat
An attacker with lots of resources and money at their disposal - Answer-An unintentional
threat actor; the most common threat

Compliments, misinformation, feigning ignorance, and being a good listener are tactics
of which social engineering technique?

Elictitation
Interrogation
Preloading
Impersonation - Answer-Elictitation

You get a call from one of your best customers. The customer is asking about your
company's employees, teams, and managers. what should you do?

You should provide the information as part of quality customer service
You should put the caller on hold and then hang up
You should not provide any information and forward the call to the help desk
You should not provide any information except your manager's name and number -
Answer-You should not provide any information and forward the call to the help desk

Jason is at home, attempting to access the website for his music store. When he goes
to the website, it has a simple form asking for name, email, and phone number. This is
not the music store website. Jason is sure the website has been hacked. How did the
attacker accomplish this hack?

Feigning ignorance
Host file modification
DNS cache poisoning
Social networking - Answer-DNS cache poisoning

An attack that targets senior executives and high-profile victims is referred to as:

Pharming

, Scrubbing
Vishing
Whaling - Answer-Whaling

You are a security consultant and have been hired to evaluate an organization's
physical security practices. All employees must pass through a locked door to enter the
main work area. Access is restricted using a biometric fingerprint lock.
A receptionist is located next to the locked door in the reception area. She uses an iPad
application to log any security events that may occur. She also uses her iPad to
complete work tasks as assigned by the organization's CEO.
What could you do to add an additional layer of security to this organization?

Require users to use workstation screensaver passwords
Train the receptionist to keep her iPad in a locked drawer
Move the receptionist's desk into the secured area
Replace the biometric locks with smart cards - Answer-Train the receptionist to keep her
iPad in a locked drawer

While reviewing video files from your organization's security cameras, you notice a
suspicious person using piggybacking to gain access to your building. The individual in
question did not have a security badge.
Which of the following would you most likely implement to keep this from happening in
the future?

Anti-passback
Scrubbing
Cable locks
Mantraps - Answer-Mantraps

Implementing emergency lighting that runs on protected power and automatically
switches on when the main power goes off is part of which physical control?

Physical access controls
Perimeter barriers
Physical access logs
Employee and visitor safety - Answer-Employee and visitor safety

Closed-circuit television can be used as both a preventative tool (to monitor live events)
or as an investigative tool (to record events for later playback). Which camera is more
vandal-resistant than other cameras?

A Pan Tilt Zoom camera
A bullet camera
A dome camera
A c-mount camera - Answer-A dome camera

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

Verzekerd van kwaliteit door reviews

Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper Perfectscorer. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €12,07. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 62890 samenvattingen verkocht

Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen

Start met verkopen
€12,07
  • (0)
  Kopen