Ethical Hacking 1 Quiz Flashcards

1
Q

What term is also used to describe an ethical hacker, which is a security professional who employs their hacking skills for defensive purposes?

A

White hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which attack approach to ethical hacking deals with the ethical hacker trying to extract the data from devices, such as laptop computers and PDAs?

A

Stolen equipment attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In the conclusion phase of an ethical hacking assignment, which of the following procedures should be followed?

A

Data that is kept for long term clients must be encrypted and stored offline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is NOT a definition of a vulnerability?

A

An action or event that might compromise security

{right definitions}

A security weakness in a target of evaluation. The presence of a weakness, design error, or implementation error. Weakness in an information system or components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which category of ethical hacker should inadvertently put their client at risk from future attacks?

A

Former black hats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which term refers to a breach in security?

A

exposure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which term means that the owner of a system should have confidence that the system will behave according to its specifications?

A

Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When conducting an ethical hacking assignment, which step is very important to conduct, as it protects the ethical hacker from prosecution?

A

Prepare NDA documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which phases of an attack is when the attacker begins to actively probe the target for vulnerabilities that can be exploited?

A

Scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The information resource or asset that is being protected from attacks is usually referred to as what?

A

The target of evaluation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly