Module 1: Introduction to Ethical Hacking Latest Update 100% Pass
Module 1: Introduction to Ethical Hacking Latest Update 100% Pass What term is also used to describe an ethical hacker, which is a security professional who employs their hacking skills for defensive purposes? 1. Attacker 2. Black hat 3. White hat 4. Cracker White hat When conducting an ethical hacking assignment, which step is very important to conduct as it protects the ethical hacker from prosecution? 1. Deliver the report to the client. 2. Talk with the client about the importance of security and the necessity of testing. 3. Prepare NDA documents. 4. Analyze the results and prepare the report. Which of the following is NOT a definition of a vulnerability? 1. Weakness in an information system or components. 2. A security weakness in a target of evaluation. 3. An action or event that might compromise security. 4. The presence of a weakness, design error, or implementation error. An action or event that might compromise security. Which attack approach to ethical hacking deals with the ethical hacker trying to extract the data from devices, such as laptop computers and PDAs? 1. Physical entry attack 2. Local network attack 3. Social engineering attack 4. Stolen equipment attack Stolen equipment attack The information resource or asset that is being protected from attacks is usually referred to as what? 1. The target of escalation. 2. The target of exploitation. 3. The target of exposure. 4. The target of evaluation. The target of evaluation. Which term means that the owner of a system should have confidence that the system will behave according to its specifications? 1. Accountability 2. Availability 3. Reusability 4. Assurance Assurance Which phase of an attack is when the attacker begins to actively probe the target for vulnerabilities that can be exploited? 1. Scanning 2. Gaining access 3. Maintaining access 4. Reconnaissance Scanning Which category of ethical hacker could inadvertently put their client at risk from future attacks? 1. Consulting firms 2. Security firms 3. White hats 4. Former black hats Former black hats Which term refers to a breach in security? T. threat 2. Vulnerability 3. Exploit 4. Exposure Exposure In the conclusion phase of an ethical hacking assignment, which of the following procedures should be followed? 1. Data that is kept for long term clients must be encrypted and stored offline. 2. The client should be urged to make the report public so everyone is aware of the issues. 3. The final report should be delivered in both digital format and hard copy for the customer's convenience. 4. All data gathered by the ethical hacker must be destroyed, even if the client is long term. Data that is kept for long term clients must be encrypted and stored offline.
Written for
- Institution
- Module 1: Introduction to Ethical Hacking
- Course
- Module 1: Introduction to Ethical Hacking
Document information
- Uploaded on
- July 27, 2023
- Number of pages
- 5
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
module 1 introduction to ethical hacking latest u
Also available in package deal