Cuestiones
ayuda
option
Mi Daypo

TEST BORRADO, QUIZÁS LE INTERESECEH_Tema1

COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del test:
CEH_Tema1

Descripción:
Preguntas del Tema 1 de CEH

Autor:
David
(Otros tests del mismo autor)

Fecha de Creación:
21/11/2022

Categoría:
Personal

Número preguntas: 20
Comparte el test:
Facebook
Twitter
Whatsapp
Comparte el test:
Facebook
Twitter
Whatsapp
Últimos Comentarios
No hay ningún comentario sobre este test.
Temario:
Which of the following statements best describes a white-hat hacker? Security professional Former black hat Former gray hat Malicious hacker.
A security audit performed on the internal network of an organization by the network administration is also known as: Gray-box testing Black-box testing White-box testing Active testing Passive testing.
What is the first phase of hacking? Attack Maintaining access Gaining access Reconnaissance Scanning.
What type of ethical hack tests access to the physical infrastructure? Internal network Remote network External network Physical access.
The security, functionality, and ease of use triangle illustrates which concept? As security increases, functionality and ease of use increase. As security decreases, functionality and ease of use increase. As security decreases, functionality and ease of use decrease. Security does not affect functionality and ease of use.
Which type of hacker represents the highest risk to your network? Disgruntled employees Black-hat hackers Gray-hat hackers Script kiddies.
What are the three phases of a security evaluation plan? (Choose three answers.) Security evaluation Preparation Conclusion Final Reconnaissance Design security Vulnerability assessment.
Hacking for a cause is called: Active Hacking Hacktivism Activism Black-hat hacking.
Which federal law is most commonly used to prosecute hackers? Title 12 Title 18 Title 20 Title 2.
When a hacker attempts to attack a host via the Internet, it is known as what type of attack? Remote attack Physical access Local access Internal attack.
Which law allows for gathering of information on targets? Freedom of Information Act Government Paperwork Elimination Act USA PATRIOT Act of 2001 Privacy Act of 1974.
The Securely Protect Yourself Against Cyber Trespass Act prohibits which of the following? (Choose all that apply.) Sending spam Installing and using keystroke loggers Using video surveillance Implementing pop-up windows.
Which step in the framework of a security audit is critical to protect the ethical hacker from legal liability? Talk to the client prior to the testing. Sign an ethical hacking agreement and NDA with the client prior to the testing. Organize an ethical hacking team and prepare a schedule prior to testing. Analyze the testing results and prepare a report.
Which of the following is a system, program, or network that is the subject of a security analysis? Owned system Vulnerability Exploited system Target of evaluation.
Which term best describes a hacker who uses their hacking skills for destructive purposes? Cracker Ethical Hacker Script Kiddie White-hat hacker.
MAC address spoofing is which type of attack? Encryption Brute Force Authentication Social engineering.
Which law gives authority to intercept voice communications in computer hacking attempts? Patriot Act Telecommunications Act Privacy Act Freedom of Information Act.
Which items should be included in an ethical hacking report? (Choose all that apply.) Testing Type Vulnerabilities discovered Suggested counternmeasures Router configuration informacion.
Which of the following should be included in an ethical hacking report? (Choose all that apply.) Findings of the test Risk analysis Documentation of laws Ethics disclosure.
Which type of person poses the most threat to an organization’s security? Black-hat hacker Disgruntled employee Script kiddie Gray-hat hacker.
Denunciar test Consentimiento Condiciones de uso