Ethical hacking final exam flashcards part 1 questions with correct answers
An ethical hacker in a person who performs most of the same activities a hacker does, but with the owner or company's permission - Answer True A malicious computer program that replicates and propagates itself without having to attach a host is called which of the following? - Answer virus Port scanning is a noninvasive, nondestructive, and legal testing procedure that is protected by federal law - Answer false What specific term does the U.S Department of justice use to label all illegal access to computer or network systems? - Answer Hacking As a security tester, you can make a network inpenetable - Answer false What derogatory do experienced hackers, who are skilled computer operators, give to inexperienced hackers? - Answer Script Kiddies Many experienced penetration testers will write a set of instructions that runs in sequence to perform tasks on a computer system. What are the penetration testers using? - Answer scripts What type of laws should a penetration tester or student learning hacking techniques be aware of? - Answer local, state and federal
Geschreven voor
- Instelling
- CEH - Certified Ethical Hacker
- Vak
- CEH - Certified Ethical Hacker
Documentinformatie
- Geüpload op
- 20 juni 2023
- Aantal pagina's
- 8
- Geschreven in
- 2022/2023
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
ethical hacking final exam flashcards part 1 quest
Ook beschikbaar in voordeelbundel