CEH! 1

Card Set Information

Author:
ROARKE008
ID:
102929
Filename:
CEH! 1
Updated:
2011-09-19 22:22:03
Tags:
CEH
Folders:

Description:
CEH
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user ROARKE008 on FreezingBlue Flashcards. What would you like to do?


  1. WHICH OF THE FOLLOWING STATEMENTS BEST DESCRIBES A WHITE HAT HACKER?
    SECURITY PROFESSIONAL
    FORMER BLACK HAT
    FORMER GREY HAT
    MALICIOUS HACKER
    WHITE HAT
  2. A SECURITY AUDIT PERFORMED ON THE INTERNAL NETWORK OF AN ORGANIZATION BY THE NETWORK ADMINISTRATION IS ALSO KNOWN AS
    GREY-BOX TESTING
    BLACK-BOX TESTING
    WHITE-BOX TESTING
    ACTIVE TESTING
    PASSIVE TESTING
    WHITE BOX
  3. WHAT IS THE FIRST PHASE OF HACKING?
    ATTACK
    MAINTAINING ACCESS
    GAINING ACCESS
    RECONNAISSANCE
    SCANNING
    RECONNAISSANCE
  4. WHAT TYPE OF ETHICAL HACK TESTS ACCESS TO THE PHYSICAL INFRASTRUCTURE?
    INTERNAL NETWORK
    REMOTE NETWORK
    EXTERNAL NETWORK
    PHYSICAL ACCESS
    PHYSICAL ACCESS
  5. THE SECURITY, FUNCTIONALITY, AND EASE OF USE TRIANGLE ILLUSTRATES WHICH CONCEPT?
    AS SECURITY INCREASES, FUNCIONALITY AND EASE OF USE INCREASE
    AS SECURITY DECREASES, FUNCTIONALITY AND EASE OF USE INCREASE
    AS SECURITY DECREASES, FUNCTIONALITY AND EASE OF USE DECREASE
    SECURITY DOES NOT AFFECT FUNTIONALITY AND EASE OF USE.
    AS SECURITY DECREASES, FUNTIONALITY AND EASE OF USE INCREASE
  6. WHICH TYPE OF HACKER REPRESENTS THE HIGHEST RISK TO YOUR NETWORK?
    DISGRUNTLED EMPLOYEES
    BLACK-HAT HACKERS
    GRAY-HAT HACKERS
    SCRIPT KIDDIES
    DISGRUNTLED EMPLOYEES
  7. WHAT ARE THE THREE PHASES OF A SECURITY EVALUATION PLAN? (CHOOSE THREE)
    SECURITY EVALUATION
    PREPARATION
    CONCLUSION
    FINAL
    RECONNAISSANCE
    DESIGN SECURITY
    VULNERABILITY ASSESSMENT
    • PREPARATION
    • SECURITY EVALUATION
    • AND CONCLUSION
  8. HACKING FOR A CAUSE IS CALLED
    ACTIVIVE HACKING
    HACKTIVISM
    ACTIVISM
    BLACK HAT HACKING
    HACKTIVISM
  9. WHICH FEDREAL LAW IS MOST COMMONLY USED TO PROSECUTE HACKERS?
    TITLE 12, 18, 20, OR 2?
    18
  10. WHEN A HACKER ATTEMPTS TO ATTACK A HOST VIA THE INTERNET, IT IS KNOWN AS WHAT TYPE OF ATTACK? REMOTE, PHYSICAL ACCESSL LOCAL ACCESS, OR AN INTERNAL ATTACK?
    REMOTE ATTACK
  11. WHICH LAW ALLOWS FOR GATHERING OF INFORMATION ON TARGETS?
    FREEDOM OF INFORMATION ACT
    GOVERNMENT PAPERWORK ELIMINATION ACT
    USA PATRIOT ACT OF 2001
    PRIVACY ACT OF 1794?
    FREEDOM OF INFORMATION ACT
  12. THE SECURELY PROTET YOURSELF AGAINS CYBER TRESPASS ACT PROHIBITS WHICH OF THE FOLLOWING?
    SPAM
    INSTALLING AND USING KEYSTROKE LOGGERS
    USING VIEO SURVEILLANCE
    IMPLEMENTING POP-UP WINDOWS
    THE SPY ACT PROHIBITS SENDING SPAM, INSTALLIGN AND USING KEYSTROKE LOGGER, AND IMPLEMENTING POP-UP WINDOWS.
  13. WHICH STEP IN THE FRAMWEWORK OF A SECURITY AUDIT IS CRITICAL TO PROTECT THE ETHICAL HACKER FROM LEGAL LIABILITY?
    SIGNING AN ETHICAL HACKING AGREEMENT AND NDA WITH THE CLIENT PRIOR TO TESTING
  14. WHICH OF THE FOLLOWING IS A SYSTEM, PROGRAM, OR NETWORK THAT IS SUBJECT OF A SECURITY ANALYSIS?
    OWNED SYSTEM
    VULNERABILITY
    EXPLOITED SYSTEM
    TARGET OF EVALUATION
    TARGET OF EVALUATION
  15. WHAT IS A CRACKER?
    A CRAKER IS A HACKER WHO USES THEIR HACKING SKILLS FOR DESTRUCTIVE PURPOSES
  16. WHAT IS MAC ADDRESS SPOOFING?
    IS AN AUTHENTICATION ATTACK USED TO DEFEAT MAC ADDRESS FILTERS
  17. WHAT LAW GIVES AUTHORITY TO INTERCEPT COIVE COMMUNICATIONS IN COMPUTER HACKING ATTEMPTS?
    THE PATRIOT ACT
  18. WHICH ITEMS SHOUD BE INCLUDED IN AN ETHICAL HACKING REPORT?
    ALL INFORMATION ABOUT THE TESTING PROCESS, VULNERABILITES DISCOVERED IN THE NETWORK OR SYSTEM, AND SUGGESTED COUNTERMEASURES SHOULD BE INCLUDED IN THE ETHICAL HACKIGN REPORT.
  19. WHAT TYPE OF PERSON POSES THE MOST THREAT TO AN ORGANIZATIONS SECURITY?
    DISGRUNTLED EMPLOYEES POSE THE BIGGEST THREAT TO AN ORGANIZATIONS SECURITY BECAUSE OF THE INFORMATION AND ACCESS THAT THEY POSSESS.
  20. WHICH OF THE FOLLOWING SHOULD BE INCLUDED IN AN ETHICAL HACKING REPORT?
    FINDINGS OF THE TEST
    RISK ANALYSIS
    DOCUMENTATION OF LAWS
    ETHICS DISCLOSURE?
    FINDINGS OF THE TEST AND RISK ANALYSIS SHOULD BOTH BE INCLUDED IN AN ETHICAL HACKING REPORT.

What would you like to do?

Home > Flashcards > Print Preview