complete solutions 2024
What jare jthe jthree jmain jtenets jof jsecurity? j
a. jConfidentiality, jintegrity, jand javailability j
b. jAuthorization, jauthentication, jand jaccountability j
c. jDeter, jdelay, jand jdetect j
d. jAcquire, jauthenticate, jand janalyze j- jANSWER✓✓-a. jConfidentiality, jintegrity,
jand javailability
Which jof jthe jfollowing jlaws jpertains jto jaccountability jfor jpublic jcompanies
jrelating jto jfinancial jinformation? j
a. jFISMA j
b. jSOX
c. j18 jU.S.C. j1029 j
d. j18 jU.S.C. j1030 j3 j- jANSWER✓✓-b. jSOX
Which jtype jof jtesting joccurs jwhen jindividuals jknow jthe jentire jlayout jof jthe
jnetwork? j
a. jBlack jbox j
b. jGray jbox j
c. jWhite jbox j
d. jBlind jtesting j- jANSWER✓✓-c. jWhite jbox
Which jtype jof jtesting joccurs jwhen jyou jhave jno jknowledge jof jthe jnetwork? j
a. jBlack jbox j
b. jGray jbox j
c. jWhite jbox j
d. jBlind jtesting j- jANSWER✓✓-a. jBlack jbox
Which jform jof jtesting joccurs jwhen jinsiders jare jnot jinformed jof jthe jpending
jtest? j
a. jBlack jbox j
b. jGray jbox j
c. jWhite jbox j
d. jBlind jtesting j- jANSWER✓✓-d. jBlind jtesting
How jis jethical jhacking jdifferent jfrom jhacking? j
a. jEthical jhackers jnever jlaunch jexploits. j
,b. jEthical jhackers jhave jsigned jwritten jpermission. j
c. jEthical jhackers jact jwith jmalice. j
d. jEthical jhackers jhave jverbal jpermission. j- jANSWER✓✓-b. jEthical jhackers
jhave jsigned jwritten jpermission.
Which jtype jof jhacker jis jconsidered ja jgood jguy? j
a. jWhite jhat j
b. jGray jhat j
c. jBlack jhat j
d. jSuicide jhacker j- jANSWER✓✓-a. jWhite jhat
Which jtype jof jhacker jis jconsidered junethical? j
a. jWhite jhat
b. jGray jhat j
c. jBlack jhat j
d. jBrown jhat j- jANSWER✓✓-c. jBlack jhat
Which jtype jof jhacker jwill jcarry jout jan jattack jeven jif jthe jresult jcould jbe ja jvery
jlong jprison jterm? j
a. jWhite jhat j
b. jGray jhat j
c. jBlack jhat j
d. jSuicide jhacker j- jANSWER✓✓-d. jSuicide jhacker
Which jtype jof jhacker jperforms jboth jethical jand junethical jactivities? j
a. jWhite jhat j
b. jGray jhat j
c. jBlack jhat j
d. jSuicide jhacker j- jANSWER✓✓-b. jGray jhat
You jhave jbeen jasked jto jperform ja jpenetration jtest jfor ja jlocal jcompany. jYou
jhave jhad jseveral jmeetings jwith jthe jclient jand jare jnow jalmost jready jto jbegin
jthe jassessment. jWhich jof jthe jfollowing jis jthe jdocument jthat jwould jcontain
jverbiage jwhich jdescribes jwhat jtype jof jtesting jis jallowed jand jwhen jyou jwill
jperform jtesting jand jlimits jyour jliabilities jas ja jpenetration jtester? j
a. jNondisclosure jagreement j
b. jRules jof jengagement j
c. jService-level jagreement j
d. jProject jscope j- jANSWER✓✓-B. jThe jrules jof jengagement jdefine jwhat jthe
jpenetration jtesting jcompany jcan jor jcannot jdo. jIt jlists jthe jspecific jactions jthat
jare jallowable.
Which jof jthe jfollowing jaddresses jthe jsecrecy jand jprivacy jof jinformation? j
a. jIntegrity j
b. jConfidentiality j
c. jAvailability j
, d. jAuthentication j- jANSWER✓✓-B. jConfidentiality jaddresses jthe jsecrecy jand
jprivacy jof jinformation. jPhysical jexamples jof jconfidentiality jinclude jlocked
jdoors, jarmed jguards, jand jfences. jLogical jexamples jof jconfidentiality jinclude
jpasswords, jencryption, jand jfirewalls.
You jare jpart jof ja jpen jtesting jteam jthat jhas jbeen jasked jto jassess jthe jrisk jof jan
jonline jservice. jManagement jis jconcerned jas jto jwhat jthe jcost jwould jbe jif jthere
jwas jan joutage jand jhow jfrequent jthese joutages jmight jbe. jYour jobjective jis jto
jdetermine jwhether jthere jshould jbe jadditional jcountermeasures. jGiven jthe
jfollowing jvariables, jwhich jof jthe jfollowing jamounts jis jthe jresulting jannualized
jloss jexpectancy j(ALE)? jSingle jloss jexpectancy j= j$ j2,500 jExposure jfactor j= j.9
jAnnual jrate jof joccurrence j= j.4 jResidual jrisk j= j$ j300 j
a. j$ j960 j
b. j$ j120 j
c. j$ j1,000 j
d. j$ j270 j- jANSWER✓✓-C. jThe jALE jis jcalculated jby jthe jfollowing: jALE j= jSLE j×
jARO, jor j$ j2,500 j× j.4 j= j$ j1000.
Who jare jthe jindividuals jwho jperform jlegal jsecurity jtests jwhile jsometimes
jperforming jquestionable jactivities? j
a. jGray jhat jhackers j
b. jEthical jhackers j
c. jCrackers j
d. jWhite jhat jhackers j- jANSWER✓✓-A. jGray jhat jhackers jare jindividuals jwho
jcross jthe jline jbetween jethical jand junethical jbehavior.
Which jof jthe jfollowing jis jthe jmost jimportant jstep jfor jthe jethical jhacker jto
jperform jduring jthe jpre-assessment? j
a. jHack jthe jweb jserver. j
b. jObtain jwritten jpermission jto jhack. j
c. jGather jinformation jabout jthe jtarget. j
d. jObtain jpermission jto jhack. j- jANSWER✓✓-B. jObtain jwritten jpermission jto
jhack. jEthical jhackers jmust jalways jobtain jlegal, jwritten jpermission jbefore
jbeginning jany jsecurity jtests
Which jof jthe jfollowing jis jone jprimary jdifference jbetween ja jmalicious jhacker
jand jan jethical jhacker? j
a. jMalicious jhackers juse jdifferent jtools jand jtechniques jthan jethical jhackers
juse. j
b. jMalicious jhackers jare jmore jadvanced jthan jethical jhackers jbecause jthey jcan
juse jany jtechnique jto jattack ja jsystem jor jnetwork. j
c. jEthical jhackers jobtain jpermission jbefore jbringing jdown jservers jor jstealing
jcredit jcard jdatabases. j
d. jEthical jhackers juse jthe jsame jmethods jbut jstrive jto jdo jno jharm. j-
jANSWER✓✓-D. jEthical jhackers juse jthe jsame jmethods jbut jstrive jto jdo jno
jharm.