Chapter 5 and 6
Chapter 5 and 6
a. Hardening
b. Masquerading
c. CORRECT: Dumpster diving
d. Hacktivism
a. Scanning
b. CORRECT: Script/Kiddie
c. Exploit
d. Cracker
b. Information Gathering
c. Availability
d. Internal Consistency
a. Internal Consistency
b. Passive Recconaissance
c. CORRECT: Active Reconnaissance:
d. Covering Tracks
a. Foot-printing
b. Data-diddling
c. Theft of passwords
d. CORRECT: Network intrusions
a. Social engineering
b. Information warfare
c. Penetration Test
d. CORRECT: Information Gathering
(Tools: Steganography, the use of tunneling protocols, and altering log files)
(No Answer)
a. Software piracy
b. Zero-Day Attack
c. CORRECT: Covering Tracks
d. Grey hats
a. Cracker
b. Whacker
c. Hardening
d. CORRECT: Scanning
c. Internal Consistency
a. Authenticity
b. Penetration Test
c. Zero-Day Attack
d. CORRECT: Vulnerability Research
a. Local Exploit
b. CORRECT: Exploit
c. Attack
d. Threat
12. A group of ethical hackers that conduct security audits for hire.(No Answer)
a. CORRECT: Tiger Team
b. Threat
c. Grey hats
d. Phreaker
a. Phreaker
b. Attack
c. Fraud
d. CORRECT: Threat
a. Identification
b. Hack value
c. CORRECT: Target of evaluation
d. Authentication
a. CORRECT: Masquerading
b. Foot-printing
c. Daisy Chaining
d. Hardening
a. CORRECT: Privacy
b. Cracker
c. Threat
d. Fraud
17. The testing team has knowledge that might be relevant to a specific type of
attack by a person internal to the organization. It determines what areas and
resources that might be accessed and available to an insider. (No Answer)
b. Social engineering
c. Owned system
18. Good guys, who use their hacking skills for defensive purposes.
a. CORRECT: White Hats
b. Threat
c. Grey hats
d. Black Hats
19. Ensures that a system's authorized users have timely and uninterrupted
access to the information in the system.(No Answer)
a. Exploit
b. CORRECT: Availability
c. Vulnerability
d. Authenticity
a. Phreaker
b. Vulnerability
c. CORRECT: Penetration Test
d. Authentication
21. Means information gathering about competitor's products, marketing, and
technologies.(No Answer)
a. Foot-printing
b. CORRECT: Competitive Intelligence
c. Network intrusions
d. Confidentiality
a. Tiger Team
b. Whacker
c. Hacktivism
d. CORRECT: Owned system
23. Refers to hacking for a cause. Usually driven by a political or social agenda.
(No Answer)
a. Black Hats
b. CORRECT: Hacktivism
c. Whacker
d. Scanning
24. Refers to a logical connection among objects in the real world and their
representations in the system.
(Using the example previously discussed, external consistency means that the
number of items recorded in the database for each department is equal to the
number of items that physically exist in that department.)(No Answer)
a. Active Reconnaissance:
b. CORRECT: External Consistency
c. Cyber-terrorist(s)
d. Internal Consistency
a. External Consistency
b. Penetration Test
c. Information warfare
d. CORRECT: Internal Consistency
a. CORRECT: Information warfare
b. Information Gathering
c. Internal Consistency
d. Penetration Test
a. Data-diddling
b. CORRECT: Bit-Flipping
c. Foot-printing
d. Scanning
28. Using computers or the Internet to commit crimes (for example, by not
delivering goods paid for by a customer)(No Answer)
a. Attack
b. Threat
c. CORRECT: Fraud
d. Privacy
a. Identification
b. Authenticity
c. CORRECT: Authentication
d. Accountability
30. Inserting a false IP address into a message to disguise the original location
of the message or to impersonate an authorized source(No Answer)
b. Social engineering
c. CORRECT: Spoofing of IP addresses
d. Theft of passwords
a. Competitive Intelligence
b. Passive Recconaissance
32. Programs (such as viruses, Trojan horses, and worms) that, when activated,
cause harm to information systems(No Answer)
a. Hack value
b. Tiger Team
c. CORRECT: Malicious code
d. Black Hats
a. Threat
b. Local Exploit
c. CORRECT: Exploit
d. Remote Exploit
a. Daisy Chaining
c. Local Exploit
d. Hardening
35. Securing the system from other hackers or security personnel by securing
their exclusive access with back-doors, root-kits, and Trojans.(No Answer)
a. Threat
b. Hacktivism
c. CORRECT: Hardening
d. Whacker
36. The testing team is provided with no information and begins the testing by
gathering information on its own initiative. This type of test simulates attacks
perpetrated by outsiders. Because the ethical hacking team has to begin from
scratch to gather knowledge about the target information system, this type of
test usually takes longer to execute and, consequently, costs more to
implement.(No Answer)
c. Penetration Test
a. Active Reconnaissance:
b. CORRECT: Passive Recconaissance
c. Internal Consistency
d. External Consistency
38. Is the notion among hackers that something is worth doing or is interesting.
(No Answer)
a. Cracker
b. Hacktivism
c. CORRECT: Hack value
d. Hardening
b. Information Gathering
c. Owned system
a. Cracker
b. Whacker
c. CORRECT: Phreaker
d. Threat
b. Active Reconnaissance:
c. Information Gathering
a. Target of evaluation
b. Theft of passwords
c. Competitive Intelligence
43. Illegally acquiring funds, usually through the manipulation and falsification
of financial statements(No Answer)
a. Phreaker
b. CORRECT: Embezzlement
c. Hardening
d. Exploit
44. Using social skills to obtain information, such as passwords or PIN numbers,
to be used in an attack against computer based systems(No Answer)
a. Scanning
b. Hardening
c. Local Exploit
d. CORRECT: Social engineering
b. Identification
c. Social engineering
d. White Hats
a. Tiger Team
b. CORRECT: Target of Evaluation
c. Authentication
d. Identification
a. White Hats
b. Covering Tracks
c. CORRECT: Software piracy
d. Foot-printing
a. Target of Evaluation
b. White Hats
c. CORRECT: Theft of passwords
d. Grey hats
a. Bit-Flipping
b. CORRECT: Foot-printing
c. Hardening
d. Masquerading
50. Hackers who get away with the database theft usually complete their task,
then backtrack to cover their tracks by destroying logs, etc.(No Answer)
a. Data-diddling
b. Scanning
c. CORRECT: Daisy Chaining
d. Hardening
a. Masquerading
b. Vulnerability Research
c. CORRECT: Vulnerability
d. Availability
52. Scripts that have been developed by others and are readily available through
the Internet, which can be employed by unskilled individuals to launch attacks
on networks and computing resources(No Answer)
d. Competitive Intelligence
a. Attack
b. CORRECT: Zero-Day Attack
c. Covering Tracks
d. Grey hats
54. Are hackers who either are offense or defensive as the situation requires. (No
Answer)
a. Tiger Team
b. Hack value
c. CORRECT: Grey hats
d. Privacy
a. Information Gathering
a. Cracker
b. CORRECT: Attack
c. Fraud
d. Whacker
a. CORRECT: Confidentiality
b. Authentication
c. Authenticity
d. Availability
58. The confirmation of the origin and identity of an information source (No
Answer)
a. CORRECT: Authenticity
b. Vulnerability
c. Availability
d. Authentication
59. Describes a hacker who uses their hacking skills and tool set for destructive
or offensive purposes such as disseminating viruses or performing DoS attacks
to compromise or bring down systems and networks.(No Answer)
a. Fraud
b. Privacy
c. CORRECT: Cracker
d. Phreaker
60. Is a novice hacker who attacks Wide Area Networks (WANs) and wireless
networks.(No Answer)
a. Cracker
b. CORRECT: Whacker
c. Threat
d. Attack
61. The modification of data(No Answer)
a. Daisy Chaining
b. Masquerading
c. CORRECT: Data-diddling
d. Bit-Flipping
62. Works over a network and exploits security vulnerabilities without any prior
access to the vulnerable system.(No Answer)
a. White Hats
b. Local Exploit
c. Exploit
d. CORRECT: Remote Exploit
63. The team has as much knowledge as possible about the network and
computing resources to be evaluated.(No Answer)
d. Penetration Test
64. Bad guys, the malicious hackers or crackers who use their skills for illegal
purposes.(No Answer)
a. Hack value
b. CORRECT: Black Hats
c. Cracker
d. White Hats
a. CORRECT: Cyber-terrorist(s)
b. Penetration Test
c. Covering Tracks
d. Internal Consistency
a. Authenticity
b. Availability
c. CORRECT: Accountability
d. Vulnerability
a. Exploit
b. Hacktivism
c. Confidentiality
d. CORRECT: Identification
a. Availability
b. Confidentiality
c. Exploit
d. CORRECT: Local Exploit
A. Security professional
B. Former black hat
C. Former grey hat
D. Malicious hacker
A. Grey-box testing
B. Black-box testing
C. White-box testing
D. Active testing
What is the first phase of hacking?
A. Attack
B. Maintaining access
C. Gaining access
D. Reconnaissance
What type of ethical hack tests access to the physical infrastructure?
A. Internal network
B. Remote network
C. External network
D. Physical access
The security, functionality, and ease of use triangle illustrates which concept?
A. Disgruntled employees
B. Black-hat hackers
C. Grey-hat hackers
D. Script kiddies
Hacking for a cause is called __________________.
A. Active hacking
B. Hacktivism
C. Activism
D. Black-hat hacking
Which federal law is most commonly used to prosecute hackers?
A. Title 12
B. Title 18
C. Title 20
D. Title 2
When a hacker attempts to attack a host via the Internet it is known as what type
of attack?
A. Remote attack
B. Physical access
C. Local access
D. Internal attack
Which of the following is a tool for performing footprinting undetected?
A. Whois search
B. Traceroute
C. Ping sweep
D. Host scanning
What is the next step to be performed after footprinting?
A. Scanning
B. Enumeration
C. System hacking
D. Active information gathering
What is footprinting?
A. Human-based
B. Computer-based
C. Nontechnical
D. Coercive
What is it called when a hacker pretends to be a valid user on the system?
A. Impersonation
B. Third-person authorization
C. Help desk
D. Valid user
What is the best reason to implement a security policy?
A. It increases security.
B. It makes security harder to enforce.
C. It removes the employee’s responsibility to make judgments.
D. It decreases security.
Faking a website for the purpose of getting a user’s password and username is
which type of social engineering attack?
A. Human-based
B. Computer-based
C. Web-based
D. User-based
Dumpster diving can be considered which type of social engineering attack?
A. Human-based
B. Computer-based
C. Physical access
D. Paper-based
What port number does FTP use?
A. 21
B. 25
C. 23
D. 80
hat port number does HTTPS use?
A. 443
B. 80
C. 53
D. 21
What is war dialing used for?
What is the main problem with using only ICMP queries for scanning?
A. Crack password
B. Escalate privileges
C. Scanning
D. Covering tracks
What is enumeration?
A. UsertoSID
B. Userenum
C. SID2User
D. Getacct
Which tool can be used to perform a DNS zone transfer on Windows?
A. nslookup
B. DNSlookup
C. whois
D. ipconfig
What is the ethics behind training how to hack a system?
a) To think like hackers and know how to defend such attacks
b) To hack a system without the permission
c) To hack a network that is vulnerable
d) To corrupt software or service using malware
___________ has now evolved to be one of the most popular automated tools for unethical
hacking.
a) Automated apps
b) Database software
c) Malware
d) Worms
he legal risks of ethical hacking include lawsuits due to __________ of personal data.
a) stealing
b) disclosure
c) deleting
d) hacking
Before performing any penetration test, through legal procedure, which key points listed
below is not mandatory?
a) Know the nature of the organization
b) Characteristics of work done in the firm
c) System and network
d) Type of broadband company used by the firm
After performing ____________ the ethical hacker should never disclose client information to
other parties.
a) hacking
b) cracking
c) penetration testing
d) exploiting
__________ is the branch of cyber security that deals with morality and provides different
theories and a principle regarding the view-points about what is right and wrong.
a) Social ethics
b) Ethics in cyber-security
c) Corporate ethics
d) Ethics in black hat hacking