Certified Ethical Hacker | Questions and Answers with complete solution
Drawing of symbols in public places to publicize an open Wi-Fi wireless network is called what? - A. WarChalking The act of altering configuration files and the expected operation of a service is known as what kind of attack? - C. Service Reconfiguration ARP (Address Resolution Protocol) does not translate IP addresses to MAC addresses. - FALSE Which of the following is a business threat category? - ALL OF THE ABOVE What does the term Hacktivism mean? - C. Hackers who are hacking for a cause. OWASP's Top 10 IoT Vulnerabilities are provided to help developers, manufacturers, enterprises and consumers make well-informed decisions when building and using IoT devices. A user recently learns of a vulnerability in their web camera's software, which allows an attacker to log in using default admin credentials to view the camera's video feed. Which of OWASP's Top 10 IoT Vulnerabilities does this BEST fall under? - C. Weak, guessable, or hardcoded passwords Patch management ensures appropriate patches are installed on all systems. - A. TRUE Which of the following is a collection of Internet information gathering and network troubleshooting utilities? - C. NetScanTools Pro Which of the following should organizations create as part of incident response planning? - D. All of the Above Which of the following analyzes an operating system and all the applications on the network to discover any security flaws that are present? - C. GFI LAN Guard
Written for
- Institution
- Certified Ethical Hacker
- Course
- Certified Ethical Hacker
Document information
- Uploaded on
- June 28, 2023
- Number of pages
- 6
- Written in
- 2022/2023
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
Also available in package deal