Скачиваний:
174
Добавлен:
23.10.2019
Размер:
7 Mб
Скачать

Answers to Review Questions 

29

Answers to Review Questions

1.A.  ​White-hat hackers are “good” guys who use their skills for defensive purposes.

2.C.  ​White-box testing is a security audit performed with internal knowledge of the systems.

3.D.  ​Reconnaissance is gathering information necessary to perform the attack.

4.D.  ​Physical access tests access to the physical infrastructure.

5.B.  ​As security increases, it makes it more difficult to use and less functional.

6.A.  ​Disgruntled employees have information that can allow them to launch a powerful attack.

7.A, B, C.  ​The three phases of a security evaluation plan are preparation, security evaluation, and conclusion.

8.B.  ​Hacktivism is performed by individuals who claim to be hacking for a political or social cause.

9.B.  ​Title 18 of the US Code is most commonly used to prosecute hackers.

10.A.  ​An attack from the Internet is known as a remote attack.

11.A.  ​The Freedom of Information Act ensures public release of many documents and records and can be a rich source of information on potential targets.

12.A, B, D.  ​Sending spam, installing and using keystroke loggers, and implementing pop-up windows are all prohibited by the SPY ACT.

13.B.  ​Signing an NDA agreement is critical to ensuring the testing is authorized and the ethical hacker has the right to access the client’s systems.

14.D.  ​A target of evaluation is a system, program, or network that is the subject of a security analysis. It is the target of the ethical hacker’s attacks.

15.A.  ​A cracker is a hacker who uses their hacking skills for destructive purposes.

16.C.  ​MAC address spoofing is an authentication attack used to defeat MAC address filters.

17.A.  ​The Patriot Act gives authority to intercept voice communications in many cases, including computer hacking.

18.A, B, C.  ​All information about the testing process, vulnerabilities discovered in the network or system, and suggested countermeasures should be included in the ethical hacking report.

19.B.  ​Disgruntled employees pose the biggest threat to an organization’s security because of the information and access that they possess.

20.A, B.  ​Findings of the test and risk analysis should both be included in an ethical hacking report.

Chapter

2

Gathering Target

Information:

Reconnaissance,

Footprinting, and

Social Engineering

CEH Exam Objectives Covered in

This Chapter:

ÛÛDefine the term footprinting

ÛÛDescribe information-gathering methodology

ÛÛDescribe competitive intelligence

ÛÛUnderstand DNS enumeration

ÛÛUnderstand Whois, ARIN lookup

ÛÛIdentify different types of DNS records

ÛÛUnderstand how traceroute is used in footprinting

ÛÛUnderstand how email tracking works

ÛÛUnderstand how web spiders work

ÛÛWhat is social engineering?

ÛÛWhat are the common types of attacks?

ÛÛUnderstand dumpster diving

ÛÛUnderstand reverse social engineering

ÛÛUnderstand insider attacks

ÛÛUnderstand identity theft

ÛÛDescribe phishing attacks

ÛÛUnderstand online scams

ÛÛUnderstand URL obfuscation

ÛÛSocial-engineering countermeasures

Соседние файлы в папке Info курс (Ethical Hacking and Countermeasures)
  • #
    23.10.201951.21 Mб121CEHV7- 17 - Session Hijacking.flv
  • #
    23.10.201955.49 Mб137CEHV7- 18 - Web and SQL Hacking.flv
  • #
    23.10.201946.99 Mб120CEHV7- 19 - Cryptography.flv
  • #
    23.10.201923.3 Mб114CEHV7- 20 - Intrusion Detection Systems.flv
  • #
    23.10.201950.17 Mб125CEHV7- 21 - Hacking Wireless Networks.flv
  • #
  • #
    23.10.201914.71 Mб115CEHV8 - Module 05 - System Hacking .pdf