Answers 100% Solved | Rated A+
The strongest and weakest link in any security scheme is the user. -
✔✔True
SARA was designed to complement and interface with other security tools,
such as Nmap. - ✔✔True
The ____ model is derived from old Western genre movies where the
"good guys" always wore white hats and the "bad guys" always wore black
hats. - ✔✔White Hat / Black Hat
What are the tactics and techniques are not involved in the modern Internet
footprinting method of network-based reconnaissance? - ✔✔nbtstat
Viruses are indiscriminate in their damaging effects, but only expert
hackers can set one loose. - ✔✔False
1
©JOSHCLAY 2024/2025. YEAR PUBLISHED 2024.
,Scanners were originally developed to aid security professionals and
system administrators in examining networks for security vulnerabilities. -
✔✔True
Most social engineering attacks are opportunistic: the hacker uses
whatever technique he or she thinks fits the situation. - ✔✔True
A user needs root privileges to perform TCP connect scanning. - ✔✔False
A(n) ____________________ examines and reports upon the condition
(open or closed) of a port as well as the application listening on that port, if
possible. - ✔✔port scanner
____ uses influence and persuasion to deceive people by convincing them
that the social engineer is someone he isn't, or by manipulation. - ✔✔Social
Engineering
____________________ are the principles of conduct that govern
individuals, groups, and professions. - ✔✔ethics
____, the precursor to the Internet, appeared in ____. - ✔✔ARPANET,
1969
2
©JOSHCLAY 2024/2025. YEAR PUBLISHED 2024.
, The Linux command ____________________ shows you where the files
appear in your PATH. - ✔✔Whereis
Breaking CD-ROMs is sufficient to destroy their data, as data cannot be
recovered from broken disks. - ✔✔False
What are the issues with copying, downloading, and using proprietary
software and other copyrighted works? - ✔✔Many hackers find it tempting
to copy, download, and use proprietary software and other copyrighted
works. While hackers typically consider this a harmless activity, it is often
illegal (based upon the license with which the software is distributed).
There is a philosophical discourse as to whether free access to information
is more or less important than a creator's right to protect his or her
creations. This is the same sort of debate as that over copyright law, the
regulations which govern the distribution and modification of written
works.Many feel that proprietary software is a form of elitism that inhibits
progress. The argument is that every person has the right to hear, read,
see, or learn anything that is available. Proponents of strong intellectual
property rights argue that there would be no creation at all if there was not
some method of ensuring remuneration or royalty for reproduction of that
intellectual property.
3
©JOSHCLAY 2024/2025. YEAR PUBLISHED 2024.