Front | Back |
Which of the following represents a valid ethical hacking test methodology?
A. HIPAA
B. RFC 1087
C. OSSTMM
D. TCSEC
|
D. TCSEC
|
It is most important to obtain ________ before beginning a penetration test.
|
PERMISSION
|
A security exposure in an operating system or application software component is caled a _____.
|
VULNERABILITY
|
The second step of the hacking process is _____.
|
SCANNING
|
When hackers talk about standards of behavior and moral issues of right and wrong, what are they referring to?
A. Rules
B. Standards
C. Laws
D. Ethics
|
D. ETHICS
|
Hackers may justify their actions based on which of the following:
A. All informatin should be free
B. Access to computers and their data should be unlimited
C. Writing viruses, malware, or other code is not a crime
D. Any of the above
|
D. ANY OF THE ABOVE
|
This individual responsible for releasing what is considered to be the first Internet worm was:
A. Kevin Mitnik
B. Robert T. Morris, Jr.
C.Adrian lamo
D.kevin Poulsen
|
B. ROBERT T. MORRIS
|
A hacker with computer skills and expertise to launch harmful attacks on computer networks and uses those skills illegally is best described as a(n):
A. Disgruntled employee
B. Ethical hacker
C. White hat hacker
D. Black hat hacker
|
D. BLACK HAT HACKER
|
If a penetration test team does not have anything more than a list of IP addresses of the organizaation's network, what type of test are the penetration testers conducting?
A. Blind assessment
B. White box
C. Gray box
D. Black box
|
D. BLACK BOX
|
How is the practice of tricking employees into revealing sensitive data about their computer system or infrastructure best described?
A. Ethcal hacking
B. Dictionary attack
C. Trojan horse
D. Social engineering
|
D. SOCIAL ENGINEERING
|
ASSET
|
Something of value that needs to be protected. In the IT realm, this can be data, software, or hardware.
|
AUTHENTICATION
|
The process of confirming that someone is who he or she claims to be, as with a username and password.
|
BLACK-BOX TESTING
|
A kind of testing of a computer system in which the testing team must approach it like a "black box," with no prior knowledge of it.
|
CRACKER
|
Someone who breaks into computer systems without authorization.
|
DENIAL OF SERVICE (DoS)
|
An attack in which a service is overwhelmed by traffic preventing or denying its legitimate use.
|