Exam Questions and CORRECT Answers
Hacker Classes - CORRECT ANSWER- Script Kiddies, State Sponsored, White Hat, Black
Hat, Grey Hat, Cyber Terrorist, Suicide Hackers, Hacktivist, Hacker Teams, Industrial Spies,
Insiders, Organised Hackers, Criminal Syndicates
6 Cyber Laws in the UK - CORRECT ANSWER- Data Protection Act, GDPR,
Communications Act, Trade Marks Act, Network and Information Systems Regulation,
Investigatory Powers Act.
Why is Ethical Hacking Necessary? - CORRECT ANSWER- In order to stop an attacker
someone needs to know how the attacks are done in the fort place
AI and ML roles in cyber security - CORRECT ANSWER- Intrusion detection software can
be powered by AI and ML.
Learn how attacks happen and be able to detect patterns. techniques attackers may use.
What is Defensive Info War? - CORRECT ANSWER- Trying to secure data/info from being
stolen by enimines
What if Offensive Info War? - CORRECT ANSWER- Trying to steal enimines data in order
to gain intel
Elements of Info Security - CORRECT ANSWER- CIA Triangle.
Confidentially
Integrity
Accessibility/Authenticity
Non-Reputability - Truth cannot be brought into question
, ISO 27001:2013 - CORRECT ANSWER- Standard for the requirements for establishing,
implementing, maintaining, and improving an information security management system within
the context of an organisation
Passive Attacks - CORRECT ANSWER- Not tampering with data
Vulnerability analysis
Listening on ports
Active Attacks - CORRECT ANSWER- Actively doing soothing malicious
Close-In Attacks - CORRECT ANSWER- When the attacker is physically close to the victim
Could be phishing attacks
Plugging USB in
Insider Attack - CORRECT ANSWER- When someone trusted inside the network attacks
Distribution Attack - CORRECT ANSWER- When the source code of a software/hardware
component is changed to gain a vulnerability
Stages of the CEH Hacking Methodology - CORRECT ANSWER- Foot printing
Scanning
Enumeration
Vulnerability Analysis
System Hacking
Gaining Access
Escalating Privilege
Maintaining Access
Clearing Logs