Hacking Exam | Verified Questions with Correct
Answers | Updated & Expert-Graded A+ | Brand-
New Edition
Because attackers break into systems for various reasons, it is important for information
security professionals to understand how malicious hackers exploit systems and the probable
reasons behind the attacks.
True
False - CORRECT ANSWER>>>>A
Information security refers to or information and information systems that
use, store, and transmit information from unauthorized access, disclosure, alteration,
and destruction.
A compiling / securing
B imaging / shielding
C duplicating / saving
D protecting / safeguarding - CORRECT ANSWER>>>>D
Information is not the critical asset that organizations need to secure.
False
True - CORRECT ANSWER>>>>A
is the part of a malware or an exploit that performs the intended malicious actions,
which can include creating backdoor access to a victim's machine, damaging or deleting files,
and data theft.
Payload
Vulnerability
Exploit
Hack value - CORRECT ANSWER>>>>A
In a , the attacker exploits vulnerabilities in a computer application before the software
developer can release a patch for them.
payload
zero-day attack
hack value
vulnerability - CORRECT ANSWER>>>>B
,Information security is defined as "a state of well-being of information and infrastructure in
which the possibility of theft, tampering, and disruption of information and services is kept
low and tolerable."
False
True - CORRECT ANSWER>>>>B
Information security relies on four major elements: confidentiality, integrity, availability,
and authenticity.
True
False - CORRECT ANSWER>>>>B
is the assurance that the information is accessible only to those authorized to have
access.
Availability
Confidentiality
Authenticity
Integrity - CORRECT ANSWER>>>>B
Confidentiality controls include data classification, data encryption, and proper
equipment disposal.
False
True - CORRECT ANSWER>>>>B
is trustworthiness of data or resources in the prevention of improper and
unauthorized changes—the assurance that information is sufficiently accurate for its purpose.
Confidentiality
Availability
Authenticity
Integrity - CORRECT ANSWER>>>>D
Measures to maintain data integrity may include a checksum and access control.
False
True - CORRECT ANSWER>>>>B
is the assurance that the systems responsible for delivering, storing, and
processing information are accessible when required by authorized users.
Integrity
Confidentiality
Availability
,D Authenticity - CORRECT ANSWER>>>>C
Measures to maintain data availability do not include redundant systems' disk array and
clustered machines, antivirus software to stop worms from destroying networks, and distributed
denial-of-service (DDoS) prevention systems.
True
False - CORRECT ANSWER>>>>B
The major role of is to confirm that a user is who he or she claims to be.
availability
integrity
confidentiality
authenticity - CORRECT ANSWER>>>>D
Controls such as biometrics, smart cards, and digital certificates ensure the authenticity of
data, transactions, communications, or documents.
False
True - CORRECT ANSWER>>>>B
is a way to guarantee that the sender of a message cannot later deny having sent
the message, and that the recipient cannot deny having received the message.
Confidentiality
Integrity
Authenticity
Non-repudiation - CORRECT ANSWER>>>>D
Individuals and organizations use digital signatures to ensure non-repudiation.
True
False - CORRECT ANSWER>>>>A
Hacking is defined as the exploitation of vulnerabilities of computer systems and networks.
False
True - CORRECT ANSWER>>>>B
For attackers, motives are the same as:
Ethics
Ideas
Values
Goals - CORRECT ANSWER>>>>D
, The term information warfare or InfoWar refers to the use of information and
communication technologies (ICT) for competitive advantages over an opponent.
True
False - CORRECT ANSWER>>>>A
Information warfare is divided into categories.
five
four
six
seven - CORRECT ANSWER>>>>D
Each category of information warfare consists of both offensive and defensive strategies.
True
False - CORRECT ANSWER>>>>A
Defensive Information Warfare refers to all strategies and actions to defend against attacks
on ICT assets.
True
False - CORRECT ANSWER>>>>A
Offensive Information Warfare refers to warfare against the assets of an opponent.
True
False - CORRECT ANSWER>>>>A
techniques include creating viruses and worms, performing denial-of-service
(DoS) attacks as well as establishing unauthorized remote access connections to a device
using Trojans/backdoors, creating botnets, packet sniffing, phishing, and password cracking.
Personal-hacking
Network-hacking
Server-hacking
Intelligence-hacking - CORRECT ANSWER>>>>B
Hackers are intelligent individuals with excellent computer skills—with the ability to create
and explore the computer's software and hardware.
False
True - CORRECT ANSWER>>>>B
All hacking is done with malicious intent.