Certified Ethical Hacker Practice Questions with Correct Answers
Black Hat Hackers Correct Answer These hackers seek to gain access to private files and information by attacking information systems. Black Hat Hackers Correct Answer Crackers Gray Hat Hackers Correct Answer This is the 'gray area' crowd. Sometimes they choose to defend an information system or network, and other times they put on their Black Hat and break laws to achieve their goals. White Hat Hackers Correct Answer These hackers have built their knowledge base in order to defend information systems. They use their computer skills to increase, rather than decrease, the security of networks. White Hat Hackers Correct Answer Ethical Hackers Security Providing Organizations Correct Answer An organization or community that delivers computer security to networks and security systems. Vulnerability Correct Answer A weak spot or lack of safeguarding procedure(s) that could likely be exploited by one or more threats, causing damage to a network and/or information system. Vulnerabilities can be found in hardware, firmware, software, applications, system utility and configuration settings/files, and operating systems. Threat Correct Answer Simply the sign or indication of a possible negative event. Can be caused by a computer user or even through a natural occurrence. remote access policy Correct Answer sets forth rules for connecting to an internal network remotely. network security policy Correct Answer lays out the basic rules for accessing the computer network, describes how the rules will be enforced, and outlines the architecture of the network environment, including the security structure. computer security policy Correct Answer delivers a definition of various aspects of a company's computer system and gives an outline of its goals. This ranges from a highly professional and formal document, to a relaxed and informal one. Security policies are enforced by organizational policies or security mechanisms. user account policy Correct Answer documents the means for someone to request an account and/or maintain an
Written for
- Institution
- CEH - Certified Ethical Hacker
- Course
- CEH - Certified Ethical Hacker
Document information
- Uploaded on
- August 26, 2023
- Number of pages
- 4
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
Also available in package deal