Book Questions and Correct Answers
If you have been contracted to perform an attack against a target system, you are what
type
of hacker?
A. White hat
B. Gray hat
C. Black hat
D. Red hat ✅A. A white hat hacker always has permission to perform pen testing
against a target system.
Which of the following describes an attacker who goes after a target to draw attention to
a
cause?
A. Terrorist
B. Criminal
C. Hacktivist
D. Script kiddie ✅C. A hacktivist is an individual or group that performs hacking and
other disruptive activities with the intention of drawing attention to a particular cause or
message.
What level of knowledge about hacking does a script kiddie have?
A. Low
B. Average
C. High
D. Advanced ✅A. Script kiddies have low or no knowledge of the hacking process but
should still be treated as dangerous.
Which of the following does an ethical hacker require to start evaluating a system?
A. Training
B. Permission
C. Planning
D. Nothing ✅B. An ethical hacker never performs their services against a target
without explicit permission of the owner of that system.
A white box test means the tester has which of the following?
A. No knowledge
B. Some knowledge
C. Complete knowledge
D. Permission ✅C. White box testers have complete knowledge of the environment
they have been tasked with attacking.
,Which of the following describes a hacker who attacks without regard for being caught
or
punished?
A. Hacktivist
B. Terrorist
C. Criminal
D. Suicide hacker ✅D. Much like suicide bombers in the real world, suicide hackers do
not worry about getting caught; they are concerned with their mission first.
Which of the following is the purpose of the footprinting process?
A. Entering a system
B. Covering tracks
C. Escalating privileges
D. Gathering information ✅D. Footprinting is used to gather information about a target
environment.
Which of the following forms are usually malicious?
A. Software applications
B. Scripts
C. Viruses
D. Grayware ✅C. Viruses are the oldest and best known form of malicious code or
malware.
What is a self-replicating piece of malware?
A. A worm
B. A virus
C. A Trojan horse
D. A rootkit ✅A. A worm is a self-replicating piece of malware that does not require
user interaction to proceed.
What is a piece of malware that relies on social engineering?
A. A worm
B. A virus
C. A Trojan horse
D. A rootkit ✅C. A Trojan horse relies more on social engineering than on technology
to be successful.
Which of the following best describes what a hacktivist does?
A. Defaces websites
B. Performs social engineering
C. Hacks for political reasons
D. Hacks with basic skills ✅C. A hacktivist engages in mischief for political reasons.
Which of the following best describes what a suicide hacker does?
A. Hacks with permission
B. Hacks without stealth
, C. Hacks without permission
D. Hacks with stealth ✅B. A suicide hacker does not worry about stealth or otherwise
concealing their activities but is more concerned with forwarding an agenda.
Which type of hacker may use their skills for both benign and malicious goals at
different
times?
A. White Hat
B. Gray Hat
C. Black Hat
D. Suicide Attackers ✅B. Grey hat hackers are typically thought of as those that were
formally black hats, but have reformed. However they have been known to use their
skills for both benign and malicious purposes.
What separates a suicide hacker from other attackers?
A. A disregard for the law
B. A desire to be helpful
C. The intent to reform
D. A lack of fear of being caught ✅D. A suicide hacker?s main difference over other
hacker?s is their complete and utter lack of concern in regards to being caught.
Which of the following would most likely engage in the pursuit of vulnerability research?
A. White Hat
B. Gray Hat
C. Black Hat
D. Suicide ✅A. White hat hackers are the most likely to engage in research activities;
though grey and black hats may engage in these activities they are not typical.
Vulnerability research deals with which of the following?
A. Actively uncovering vulnerabilities
B. Passively uncovering vulnerabilities
C. Testing theories
D. Applying security guidance ✅B. Vulnerability research is a way of passively
uncovering weaknesses.
How is black box testing performed?
A. With no knowledge
B. With full knowledge
C. With partial knowledge
D. By a black hat ✅A. Black box testing is performed with no knowledge to simulate an
actual view of what a hacker would have.
A contract is important because it does what?
A. Gives permission
B. Gives test parameters
C. Gives proof