100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Multiple choice Certified Ethical Hacker Book Questions and Correct Answers

Rating
-
Sold
-
Pages
17
Grade
A+
Uploaded on
23-09-2024
Written in
2024/2025

If you have been contracted to perform an attack against a target system, you are what type of hacker? A. White hat B. Gray hat C. Black hat D. Red hat A. A white hat hacker always has permission to perform pen testing against a target system. Which of the following describes an attacker who goes after a target to draw attention to a cause? A. Terrorist B. Criminal C. Hacktivist D. Script kiddie C. A hacktivist is an individual or group that performs hacking and other disruptive activities with the intention of drawing attention to a particular cause or message. What level of knowledge about hacking does a script kiddie have? A. Low B. Average C. High D. Advanced A. Script kiddies have low or no knowledge of the hacking process but should still be treated as dangerous. Which of the following does an ethical hacker require to start evaluating a system? A. Training B. Permission C. Planning D. Nothing B. An ethical hacker never performs their services against a target without explicit permission of the owner of that system. A white box test means the tester has which of the following? A. No knowledge B. Some knowledge C. Complete knowledge D. Permission C. White box testers have complete knowledge of the environment they have been tasked with attacking. Which of the following describes a hacker who attacks without regard for being caught or punished? A. Hacktivist B. Terrorist C. Criminal D. Suicide hacker D. Much like suicide bombers in the real world, suicide hackers do not worry about getting caught; they are concerned with their mission first. Which of the following is the purpose of the footprinting process? A. Entering a system B. Covering tracks C. Escalating privileges D. Gathering information D. Footprinting is used to gather information about a target environment.

Show more Read less
Institution
Ethical Hacking
Course
Ethical Hacking










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Ethical Hacking
Course
Ethical Hacking

Document information

Uploaded on
September 23, 2024
Number of pages
17
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Multiple choice Certified Ethical Hacker
Book Questions and Correct Answers
If you have been contracted to perform an attack against a target system, you are what
type
of hacker?
A. White hat
B. Gray hat
C. Black hat
D. Red hat ✅A. A white hat hacker always has permission to perform pen testing
against a target system.

Which of the following describes an attacker who goes after a target to draw attention to
a
cause?
A. Terrorist
B. Criminal
C. Hacktivist
D. Script kiddie ✅C. A hacktivist is an individual or group that performs hacking and
other disruptive activities with the intention of drawing attention to a particular cause or
message.

What level of knowledge about hacking does a script kiddie have?
A. Low
B. Average
C. High
D. Advanced ✅A. Script kiddies have low or no knowledge of the hacking process but
should still be treated as dangerous.

Which of the following does an ethical hacker require to start evaluating a system?
A. Training
B. Permission
C. Planning
D. Nothing ✅B. An ethical hacker never performs their services against a target
without explicit permission of the owner of that system.

A white box test means the tester has which of the following?
A. No knowledge
B. Some knowledge
C. Complete knowledge
D. Permission ✅C. White box testers have complete knowledge of the environment
they have been tasked with attacking.

,Which of the following describes a hacker who attacks without regard for being caught
or
punished?
A. Hacktivist
B. Terrorist
C. Criminal
D. Suicide hacker ✅D. Much like suicide bombers in the real world, suicide hackers do
not worry about getting caught; they are concerned with their mission first.

Which of the following is the purpose of the footprinting process?
A. Entering a system
B. Covering tracks
C. Escalating privileges
D. Gathering information ✅D. Footprinting is used to gather information about a target
environment.

Which of the following forms are usually malicious?
A. Software applications
B. Scripts
C. Viruses
D. Grayware ✅C. Viruses are the oldest and best known form of malicious code or
malware.

What is a self-replicating piece of malware?
A. A worm
B. A virus
C. A Trojan horse
D. A rootkit ✅A. A worm is a self-replicating piece of malware that does not require
user interaction to proceed.

What is a piece of malware that relies on social engineering?
A. A worm
B. A virus
C. A Trojan horse
D. A rootkit ✅C. A Trojan horse relies more on social engineering than on technology
to be successful.

Which of the following best describes what a hacktivist does?
A. Defaces websites
B. Performs social engineering
C. Hacks for political reasons
D. Hacks with basic skills ✅C. A hacktivist engages in mischief for political reasons.

Which of the following best describes what a suicide hacker does?
A. Hacks with permission
B. Hacks without stealth

, C. Hacks without permission
D. Hacks with stealth ✅B. A suicide hacker does not worry about stealth or otherwise
concealing their activities but is more concerned with forwarding an agenda.

Which type of hacker may use their skills for both benign and malicious goals at
different
times?
A. White Hat
B. Gray Hat
C. Black Hat
D. Suicide Attackers ✅B. Grey hat hackers are typically thought of as those that were
formally black hats, but have reformed. However they have been known to use their
skills for both benign and malicious purposes.

What separates a suicide hacker from other attackers?
A. A disregard for the law
B. A desire to be helpful
C. The intent to reform
D. A lack of fear of being caught ✅D. A suicide hacker?s main difference over other
hacker?s is their complete and utter lack of concern in regards to being caught.

Which of the following would most likely engage in the pursuit of vulnerability research?
A. White Hat
B. Gray Hat
C. Black Hat
D. Suicide ✅A. White hat hackers are the most likely to engage in research activities;
though grey and black hats may engage in these activities they are not typical.

Vulnerability research deals with which of the following?
A. Actively uncovering vulnerabilities
B. Passively uncovering vulnerabilities
C. Testing theories
D. Applying security guidance ✅B. Vulnerability research is a way of passively
uncovering weaknesses.

How is black box testing performed?
A. With no knowledge
B. With full knowledge
C. With partial knowledge
D. By a black hat ✅A. Black box testing is performed with no knowledge to simulate an
actual view of what a hacker would have.

A contract is important because it does what?
A. Gives permission
B. Gives test parameters
C. Gives proof

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
twishfrancis Kaplan University
View profile
Follow You need to be logged in order to follow users or courses
Sold
199
Member since
1 year
Number of followers
42
Documents
10607
Last sold
5 days ago
SmartStudy Hub

Discover top-quality study materials at SmartStudy Hub. From concise summaries to exam guides, I offer resources designed to boost your grades. Trust in my expertise and elevate your academic performance today! NB: I do assignments too. Struggling to meet your academic deadlines? I've got you covered! I'll ensure papers are delivered on time, each time. Don't let deadlines stress you out- let's work together to achieve your academic goals! WELCOME!!!

Read more Read less
4.0

38 reviews

5
22
4
6
3
4
2
0
1
6

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions