Certified Ethical Hacker v10 Practice Exam | 65 Questions with 100% Correct Answers
Drawing of symbols in public places to publicize an open Wi-Fi wireless network is called what? - A. WarChalking The act of altering configuration files and the expected operation of a service is known as what kind of attack? - C. Service Reconfiguration ARP (Address Resolution Protocol) does not translate IP addresses to MAC addresses. - FALSE Which of the following is a business threat category? - ALL OF THE ABOVE What does the term Hacktivism mean? - C. Hackers who are hacking for a cause. OWASP's Top 10 IoT Vulnerabilities are provided to help developers, manufacturers, enterprises and consumers make well-informed decisions when building and using IoT devices. A user recently learns of a vulnerability in their web camera's software, which allows an attacker to log in using default admin credentials to view the camera's video feed. Which of OWASP's Top 10 IoT Vulnerabilities does this BEST fall under? - C. Weak, guessable, or hardcoded passwords Patch management ensures appropriate patches are installed on all systems. - A. TRUE
Written for
- Institution
- Certified Ethical Hacker v10
- Course
- Certified Ethical Hacker v10
Document information
- Uploaded on
- February 13, 2023
- Number of pages
- 5
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
certified ethical hacker v10 practice exam | 65 questions with 100 correct answers