Ethical Hacker

Beschreibung

Para realizar la certificacion de ethical Hacker
k-sita_eunice
Quiz von k-sita_eunice, aktualisiert more than 1 year ago
k-sita_eunice
Erstellt von k-sita_eunice vor mehr als 9 Jahre
218
0

Zusammenfassung der Ressource

Frage 1

Frage
A __________ modifies its own code to elude detection.
Antworten
  • Compression virus
  • Boot sector virus
  • Stealth virus
  • Self-garbing virus

Frage 2

Frage
__________: A process that database designers go through to eliminate redundant data, repeating groups and attributes.
Antworten
  • Data normalization
  • SQL

Frage 3

Frage
__________: Data manipulation and relational database definition language.
Antworten
  • Data normalization
  • SQL

Frage 4

Frage
__________ stands for push data bit used to signify that data in this packet should be put at the beginning of the queue of data to be processed.
Antworten
  • ACK
  • FIN
  • URG
  • PSH

Frage 5

Frage
A __________ can reproduce on their own which is different from viruses and self-contained programs.
Antworten
  • Worms
  • Logic Bomb
  • Trojan Horse

Frage 6

Frage
__________ are shopping carts, CMS driven sites, and the level at which the user interfaces.
Antworten
  • Application Levels
  • Middleware Levels
  • Operating System Levels
  • Hardware Levels

Frage 7

Frage
__________ are database and work between the Operating system and Application level.
Antworten
  • Application Levels
  • Middleware Levels
  • Operating System Levels
  • Hardware Levels

Frage 8

Frage
__________ are Linux and Windows.
Antworten
  • Application Levels
  • Middleware Levels
  • Operating System Levels
  • Hardware Levels

Frage 9

Frage
True or False. Users peform day-to-day tasks that support the overall security program.
Antworten
  • True
  • False

Frage 10

Frage
__________ are retina scan, fingerprint and voice print.
Antworten
  • Biometrics
  • Token Devices
  • Memory Cards
  • Smart Cards

Frage 11

Frage
IP, ICMP, RIP, IGMP, and IPX are protocols found at which layer of the OSI Model?
Antworten
  • Session Layer
  • Transport Layer
  • Network Layer
  • Data Link Layer

Frage 12

Frage
SLIP, PPP, ARP, RARP, L2F, and L2TP are protocols found at which layer of the OSI Model?
Antworten
  • Session Layer
  • Transport Layer
  • Network Layer
  • Data Link Layer

Frage 13

Frage
High-speed Serial Interface (HSSI), H.21, EIA/TIA-232, and EIA/TIA-449 are protocols found at which layer of the OSI Model?
Antworten
  • Session Layer
  • Transport Layer
  • Physical Layer
  • Data Link Layer

Frage 14

Frage
ASCII, TIFF, GIF, JPEG, MPEG, MIDI, MIME are protocols found at which layer of the OSI Model?
Antworten
  • Application Layer
  • Presentation Layer
  • Session Layer
  • Transport Layer

Frage 15

Frage
NetBIOS, NFS, SQL, and RPC are protocols found at which layer of the OSI Model?
Antworten
  • Presentation Layer
  • Session Layer
  • Transport Layer
  • Network Layer

Frage 16

Frage
__________ is when two keys generate the same cipher text from the same plain text.
Antworten
  • Cryptanalysis
  • Cryptology
  • Key Clustering
  • Cipher

Frage 17

Frage
True or False. A hash is a process to create a unique string of characters from any data source – password or executable.
Antworten
  • True
  • False

Frage 18

Frage
True or False. A hash collision is when two distinct data sources are input into a hashing function, which then produce identical outputs.
Antworten
  • True
  • False

Frage 19

Frage
__________ is the science of studying and breaking encryption mechanisms
Antworten
  • Cryptography
  • Cipher
  • Cryptographic Algorithm
  • Cryptanalysis

Frage 20

Frage
__________ is the study of cryptography and cryptanalysis
Antworten
  • Cryptanalysis
  • Cryptology
  • Key Clustering
  • Cipher

Frage 21

Frage
__________ is the probability that a threat will exploit a vulnerability to adversely affect an information asset.
Antworten
  • Risk
  • Threat
  • Treat Impact
  • Threat probability

Frage 22

Frage
__________ is an event, the occurrence of which could have an undesired impart
Antworten
  • Risk
  • Threat
  • Treat Impact
  • Threat probability

Frage 23

Frage
. __________ is a measure of the magnitude of loss or harm on the value of an asset.
Antworten
  • Risk
  • Threat
  • Treat Impact
  • Threat probability

Frage 24

Frage
__________ is the chance that an event will occur or that specific loss value may be attained should the event occur.
Antworten
  • Risk
  • Threat
  • Treat Impact
  • Threat probability

Frage 25

Frage
__________ is a risk-reducing measure that acts to detect, prevent, and minimize loss associated with the occurrence of a specified threat or category of threats.
Antworten
  • Risk
  • Safeguard
  • Treat Impact
  • Threat probability

Frage 26

Frage
True or False. Passive reconnaissance is the process of collecting information about an intended target by making contact with the target through Social Engineering or Electronic probing of the target system.
Antworten
  • True
  • False

Frage 27

Frage
True or False. Active reconnaissance is the process of collecting information about an intended target without direct contact with the target.
Antworten
  • True
  • False

Frage 28

Frage
True or False. Authority is where attackers pose as victim’s boss, boss’s secretary, or other company personnel.
Antworten
  • True
  • False

Frage 29

Frage
True or False. Strong emotion gets victims into heightened emotional state so they don’t pay as much attention to the details/facts.
Antworten
  • True
  • False

Frage 30

Frage
True or False. Overloading provides more information than target can handle so wrong statements go unnoticed also known as ‘Double Talk’.
Antworten
  • True
  • False

Frage 31

Frage
__________ inserts the torque wrench and apply a turning pressure to the cylinder. The first pin will ‘bind’ against the hull. Attempt to raise the binding pin until the cylinder rotates slightly.
Antworten
  • Binding Pin
  • Binding
  • Binding Order
  • Raking

Frage 32

Frage
__________ is when the binding pin is at the sheer line, the cylinder will rotate slightly. The next pin will now bind. Repeat the process until all pins are at the sheer line. Be careful not to push the pin too far into the hull. This will bind the key pin and prevent the cylinder from rotating. To resolve this, torque must be released to drop the pin.
Antworten
  • Binding Pin
  • Binding
  • Binding Order
  • Raking

Frage 33

Frage
__________ is the order in which the pins bind is different for each lock type. It depends on the manufacturing process and the lateral position of the pins.
Antworten
  • Binding Pin
  • Binding
  • Binding Order
  • Raking

Frage 34

Frage
__________ is at home you can take your time picking a lock, but in the field, speed is always essential. A lock picking technique called raking can quickly open most locks. Basically, you use the pick to rake back and forth over the pins while you adjust the amount of torque on the plug.
Antworten
  • Binding Pin
  • Binding
  • Binding Order
  • Raking

Frage 35

Frage
__________ is done by inserting a thin, strong, ‘credit card’ shaped object between the door and the frame, you can force the locking wedge into the lock.
Antworten
  • Binding Pin
  • Binding
  • Shimming Door Locks
  • Raking

Frage 36

Frage
__________ creates an encrypted virtual tunnel between your computer and one of our high bandwidth security proxy servers. This tunnel shields you from the most sophisticated methods of online spying and snooping.
Antworten
  • SecurSURF
  • RoboForm
  • Thunderbird
  • Hushmail

Frage 37

Frage
__________ is User ID/password management application.
Antworten
  • SecurSURF
  • RoboForm
  • Thunderbird
  • Hushmail

Frage 38

Frage
__________ is portable E-mail access
Antworten
  • SecurSURF
  • RoboForm
  • Thunderbird
  • Hushmail

Frage 39

Frage
__________ is a Web based email solution.
Antworten
  • SecurSURF
  • RoboForm
  • Thunderbird
  • Hushmail

Frage 40

Frage
True or False. TOR is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet
Antworten
  • True
  • False

Frage 41

Frage
True or False. A buffer overflow condition exists when a program attempts to put more data in a buffer than it can hold or when a program attempts to put data in a memory area past a buffer.
Antworten
  • True
  • False

Frage 42

Frage
True or False. When a programmer writes a piece of software that will accept data, a variable has to be constructed to hold it.
Antworten
  • True
  • False

Frage 43

Frage
True or False. The programmer does not have to allocate this memory space, which is referred to as a buffer.
Antworten
  • True
  • False

Frage 44

Frage
True or False. A buffer is a contiguous segment of memory that holds several instances of the same type of data.
Antworten
  • True
  • False

Frage 45

Frage
True or False. When a Web browser requests a Web page from a server it sends over an HTTP Request command.
Antworten
  • True
  • False
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

Test: "La computadora y sus partes"
Dayana Quiros R
Excel Básico-Intermedio
Diego Santos
Evolución de la Informática
Diego Santos
FUNDAMENTOS DE REDES DE COMPUTADORAS
anhita
Introducción a la Ingeniería de Software
David Pacheco Ji
La ingenieria de requerimientos
Sergio Abdiel He
TECNOLOGÍA TAREA
Denisse Alcalá P
Navegadores de Internet
M Siller
CONCEPTOS BÁSICOS DE EXCEL
paussh_best11
PROCESADORES DE TEXTO
rm-asociados
Hoja de Cálculo Excel
Miguel Angel España