6wb ETI
6wb ETI
Workbook-5
D. Malicious hacker
Answer..
A. Grey-box testing
B. Black-box testing
C. White-box testing
D. Active testing
E. Passive testing
Answer.
A. Attack
B. Maintaining access
C. Gaining access
D. Reconnaissance
E. Scanning
Answer.
4. What type of ethical hack tests access to the physical infrastructure?
A. Internal network
B. Remote network
C. External network
D. Physical access
Answer.
5. The security, functionality, and ease of use triangle illustrates which concept?
Answer.
6. Which type of hacker represents the highest risk to your network?
A. Disgruntled employees
B. Black-hat hackers
C. Grey-hat hackers
D. Script kiddies
Answer.
7. What are the three phases of a security evaluation plan? (Choose three
answers.)
B. Preparation
C. Conclusion
D. Final
E. Reconnaissance
F. Design Security
G. Vulnerability Assessment
Answer.
8. Hacking for a cause is called __________________.
A. Active hacking
B. Hacktivism
C. Activism
D. Black-hat hacking
Answer.
9. Which federal law is most commonly used to prosecute hackers?
A. Title 12
B. Title 18
C. Title 20
D. Title 2
Answer.
10. When a hacker attempts to attack a host via the Internet it is known as what
type of attack?
A. Remote attack
B. Physical access
C. Local access
D. Internal attack
Answer.