![]() ![]() What is the next step to be performed after footprinting?Įxplanation: According to CEH methodology, scanning occurs after footprinting. NMAP and SuperScan are host and network scanning tools. Which of the following tools are used for footprinting? (Choose 3 answers.)Įxplanation: Whois, Sam Spade, and nslookup are all used to passively gather information about a target. Which of the following is a tool for performing footprinting undetected?Įxplanation: Whois is the only tool listed that won’t trigger an IDS alert or otherwise be detected by an organization. Which are the four regional Internet registries?Įxplanation: The four Internet registries are ARIN (American Registry of Internet Numbers), RIPE NCC (Europe, the Middle East, and parts of Central Asia), LACNIC (Latin American and Caribbean Internet Addresses Registry), and APNIC (Asia Pacific Network Information Centre). When a hacker attempts to attack a host via the Internet it is known as what type of attack?Įxplanation: An attack from the Internet is known as a remote attack. Code of law is most commonly used to prosecute hackers Which federal law is most commonly used to prosecute hackers?Įxplanation: Title 18 of the U.S. Hacking for a cause is called _.Įxplanation: Hacktivism is performed by individual who claim to be hacking for a political or social cause. What are the three phases of a security evaluation plan? (Choose three answers.)Įxplanation: The three phases of a security evaluation plan are preparation, conduct security evaluation, and conclusion. Which type of hacker represents the highest risk to your network?Įxplanation: Disgruntled employees have information which can allow them to launch a powerful attack. Security does not affect functionality and ease of use.Įxplanation: As security increases it makes it more difficult to use and less functional. As security decreases, functionality and ease of use decrease. As security decreases, functionality and ease of use increase. As security increases, functionality and ease of use increase. ![]() The security, functionality, and ease of use triangle illustrates which concept? What type of ethical hack tests access to the physical infrastructure?Įxplanation: Physical access tests access to the physical infrastructure. What is the first phase of hacking?Įxplanation: Reconnaissance is gathering information necessary to perform the attack. A security audit performed on the internal network of an organization by the network administration is also known as _.Įxplanation: White-box testing is a security audit performed with internal knowledge of the systems. Which of the following statements best describes a white-hat hacker?Įxplanation: A white-hat hacker is a “good” guy who uses his skills for defensive purposes. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |