option
Cuestiones
ayuda
daypo
buscar.php

CEH_Tema1

COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del Test:
CEH_Tema1

Descripción:
Preguntas del Tema 1 de CEH

Fecha de Creación: 2022/11/21

Categoría: Personal

Número Preguntas: 20

Valoración:(0)
COMPARTE EL TEST
Nuevo ComentarioNuevo Comentario
Comentarios
NO HAY REGISTROS
Temario:

Which of the following statements best describes a white-hat hacker?. Security professional. Former black hat. Former gray hat. Malicious hacker.

A security audit performed on the internal network of an organization by the network administration is also known as: Gray-box testing. Black-box testing. White-box testing. Active testing. Passive testing.

What is the first phase of hacking?. Attack. Maintaining access. Gaining access. Reconnaissance. Scanning.

What type of ethical hack tests access to the physical infrastructure?. Internal network. Remote network. External network. Physical access.

The security, functionality, and ease of use triangle illustrates which concept?. As security increases, functionality and ease of use increase. As security decreases, functionality and ease of use increase. As security decreases, functionality and ease of use decrease. Security does not affect functionality and ease of use.

Which type of hacker represents the highest risk to your network?. Disgruntled employees. Black-hat hackers. Gray-hat hackers. Script kiddies.

What are the three phases of a security evaluation plan? (Choose three answers.). Security evaluation. Preparation. Conclusion. Final. Reconnaissance. Design security. Vulnerability assessment.

Hacking for a cause is called: Active Hacking. Hacktivism. Activism. Black-hat hacking.

Which federal law is most commonly used to prosecute hackers?. Title 12. Title 18. Title 20. Title 2.

When a hacker attempts to attack a host via the Internet, it is known as what type of attack?. Remote attack. Physical access. Local access. Internal attack.

Which law allows for gathering of information on targets?. Freedom of Information Act. Government Paperwork Elimination Act. USA PATRIOT Act of 2001. Privacy Act of 1974.

The Securely Protect Yourself Against Cyber Trespass Act prohibits which of the following? (Choose all that apply.). Sending spam. Installing and using keystroke loggers. Using video surveillance. Implementing pop-up windows.

Which step in the framework of a security audit is critical to protect the ethical hacker from legal liability?. Talk to the client prior to the testing. Sign an ethical hacking agreement and NDA with the client prior to the testing. Organize an ethical hacking team and prepare a schedule prior to testing. Analyze the testing results and prepare a report.

Which of the following is a system, program, or network that is the subject of a security analysis?. Owned system. Vulnerability. Exploited system. Target of evaluation.

Which term best describes a hacker who uses their hacking skills for destructive purposes?. Cracker. Ethical Hacker. Script Kiddie. White-hat hacker.

MAC address spoofing is which type of attack?. Encryption. Brute Force. Authentication. Social engineering.

Which law gives authority to intercept voice communications in computer hacking attempts?. Patriot Act. Telecommunications Act. Privacy Act. Freedom of Information Act.

Which items should be included in an ethical hacking report? (Choose all that apply.). Testing Type. Vulnerabilities discovered. Suggested counternmeasures. Router configuration informacion.

Which of the following should be included in an ethical hacking report? (Choose all that apply.). Findings of the test. Risk analysis. Documentation of laws. Ethics disclosure.

Which type of person poses the most threat to an organization’s security?. Black-hat hacker. Disgruntled employee. Script kiddie. Gray-hat hacker.

Denunciar Test