2
Ethical Hacking Exam 1 with accurate detailed solutions || || || || || || ||
What is another term for ethical hacker.
|| || || || || ||
penetration tester ||
The following attacks are simulated by what team?
|| || || || || || ||
Conduct remote attacks via the Internet || || || || ||
DNS tunneling
||
ICMP tunneling ||
Intrusion attempts ||
Insider threat ||
VPN-based attacks ||
Access card copy and strength test
|| || || || ||
Identity spoof ||
HID attack
||
Fake WAP ||
Spoofing
Lazy/broken processes ||
Zombies/bots
Attack on physical security || || ||
Red Team
||
, 2
Their primary motivation is usually for personal or financial gain, but they can also be
|| || || || || || || || || || || || || || ||
involved in cyber espionage, protest or perhaps are just addicted to the thrill of cybercrime.
|| || || || || || || || || || || || || ||
black hat hacker
|| ||
_______________________ involves maintaining the consistency, accuracy, and || || || || || || ||
trustworthiness of data over its entire life cycle . || || || || || || || ||
integrity
The three types of authentication are: Something you are, Something you have , and
|| || || || || || || || || || || || ||
_________________________________.
something you know || ||
_________________ is the assurance that someone cannot deny the validity of something. || || || || || || || || || || ||
non-repudiation
Which phase of the penetration testing methodology do these relate to?
|| || || || || || || || || ||
Internet searches ||
Social engineering
||
Dumpster diving ||
Domain name management/search services
|| || ||
Non-intrusive network scanning || ||
Reconnaissance
Ethical Hacking Exam 1 with accurate detailed solutions || || || || || || ||
What is another term for ethical hacker.
|| || || || || ||
penetration tester ||
The following attacks are simulated by what team?
|| || || || || || ||
Conduct remote attacks via the Internet || || || || ||
DNS tunneling
||
ICMP tunneling ||
Intrusion attempts ||
Insider threat ||
VPN-based attacks ||
Access card copy and strength test
|| || || || ||
Identity spoof ||
HID attack
||
Fake WAP ||
Spoofing
Lazy/broken processes ||
Zombies/bots
Attack on physical security || || ||
Red Team
||
, 2
Their primary motivation is usually for personal or financial gain, but they can also be
|| || || || || || || || || || || || || || ||
involved in cyber espionage, protest or perhaps are just addicted to the thrill of cybercrime.
|| || || || || || || || || || || || || ||
black hat hacker
|| ||
_______________________ involves maintaining the consistency, accuracy, and || || || || || || ||
trustworthiness of data over its entire life cycle . || || || || || || || ||
integrity
The three types of authentication are: Something you are, Something you have , and
|| || || || || || || || || || || || ||
_________________________________.
something you know || ||
_________________ is the assurance that someone cannot deny the validity of something. || || || || || || || || || || ||
non-repudiation
Which phase of the penetration testing methodology do these relate to?
|| || || || || || || || || ||
Internet searches ||
Social engineering
||
Dumpster diving ||
Domain name management/search services
|| || ||
Non-intrusive network scanning || ||
Reconnaissance