Ethical Hacking and Penetration Testing Exam Preparation Guide - 1136 Verified Questions

Page 1


Ethical Hacking and Penetration Testing

Exam Preparation Guide

Course Introduction

This course provides an in-depth exploration of ethical hacking principles and penetration testing methodologies used to safeguard computer systems and networks. Students will learn how to think like an attacker by identifying vulnerabilities, exploiting common security flaws, and deploying tools and techniques used by cybersecurity professionals. Emphasis is placed on legal and ethical considerations, responsible disclosure, and adherence to industry standards. Through a combination of theoretical concepts and hands-on labs, participants will develop skills in reconnaissance, scanning, enumeration, vulnerability analysis, exploitation, and reporting, preparing them for real-world security assessments and entry-level positions in cybersecurity.

Recommended Textbook

Principles of Computer Security CompTIA Security+ and Beyond 3rd Edition by Wm. Arthur Conklin

Available Study Resources on Quizplus

25 Chapters

1136 Verified Questions

1136 Flashcards

Source URL: https://quizplus.com/study-set/2933 Page 2

Chapter 1: Introduction and Security Trends

Available Study Resources on Quizplus for this Chatper

49 Verified Questions

49 Flashcards

Source URL: https://quizplus.com/quiz/58443

Sample Questions

Q1) The second step an administrator can take in minimizing possible avenues of attack is _______________.

Answer: system hardening

Q2) According to the Computer Crime and Security Survey,the four types of attacks that increased from 2007 to 2008 were

A)Viruses,insider abuse,laptop theft,and unauthorized access

B)Unauthorized access,theft/loss of proprietary information,misuse of web applications,and DNS attacks

C)Viruses,insider abuse,misuse of web applications,and DNS attacks

D)Laptop theft,unauthorized access,and theft/loss of proprietary information

Answer: B

Q3) In 2009 _______________ was cut and resulted in widespread phone and Internet outages in the San Jose area of California.

Answer: fiber cable

Q4) As the level of sophistication of attacks _________,the level of knowledge necessary to exploit vulnerabilities decreased.

Answer: increased

To view all questions and flashcards with answers, click on the resource link above.

3

Chapter 2: General Security Concepts

Available Study Resources on Quizplus for this Chatper

65 Verified Questions

65 Flashcards

Source URL: https://quizplus.com/quiz/58442

Sample Questions

Q1) _______________ security takes a granular view of security by focusing on protecting each computer and device individually instead of addressing protection of the network as a whole.

Answer: Host

Q2) The objective of the Bell-LaPadula security model is integrity.

A)True

B)False

Answer: False

Q3) The policies of the Bell-LaPadula model are

A)Ring (no read down)and Low-Water-Mark (no write up)

B)*-Property (no write up)and Simple Security Rule (no read down)

C)Ring (no read up)and Low-Water-Mark (no write down)

D)*-Property (no write down)and Simple Security Rule (no read up)

Answer: D

Q4) Network security places the emphasis on controlling access to external resources from internal entities.

A)True

B)False

Answer: False

To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Operational-Organizational Security

Available Study Resources on Quizplus for this Chatper

43 Verified Questions

43 Flashcards

Source URL: https://quizplus.com/quiz/58441

Sample Questions

Q1) _______________ are the step-by-step instructions on how to implement policies in the organization.

Answer: Procedures

Q2) Choosing the location of equipment can have an impact on your security.Explain the security issues you would consider when placing various types of equipment.

Answer: Wireless access points should be placed where it is difficult for outsiders to access.Monitors should not face windows.Devices that have electromagnetic emanation should be contained properly.

Q3) Voice recognition,iris scans,and facial geometry can be used for biometric access controls.

A)True

B)False

Answer: True

Q4) TEMPEST is a program developed by the US department of defense to protect equipment from the ill effects of weather and other natural disasters.

A)True

B)False

Answer: False

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: The Role of People in Security

Available Study Resources on Quizplus for this Chatper

40 Verified Questions

40 Flashcards

Source URL: https://quizplus.com/quiz/58440

Sample Questions

Q1) An attacker posts a flier offering services to clean computers of a virus that is sweeping the Internet,speeding them up as a result.A person concerned that he may have the virus because his computer was running slow,calls the attacker,asking for help.This is an example of ___________________.

Q2) Phishing is the most common form of social engineering attack related to computer security.

A)True

B)False

Q3) Spear phishing is when an attacker attempts to redirect a user to a bogus web site that appears similar to the web site the user had intended to access.

A)True

B)False

Q4) Social engineers attempt to exploit the natural tendencies of people.They do this by

A)First trying to evoke sympathy;if this fails,then by fear of confrontation

B)First trying to evoke fear of confrontation and then by sympathy

C)First trying to guess passwords and then use a password cracker

D)First trying to evoke passion and then fear

Q5) Give an example of a hoax and how it might actually be destructive.

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Cryptography

Available Study Resources on Quizplus for this Chatper

49 Verified Questions

49 Flashcards

Source URL: https://quizplus.com/quiz/58439

Sample Questions

Q1) Which of the following is NOT a hashing algorithm

A)SHA1

B)MD2

C)SHA3

D)MD5

Q2) The ROT13 cipher is an example of a

A)Shift cipher

B)Substitution cipher

C)Transposition cipher

D)Vigenère cipher

Q3) _______________ puts the plaintext through a simplified cipher to try to deduce what the key is likely to be in a full version of the cipher.

Q4) All of the following are asymmetric encryption algorithms EXCEPT:

A)RSA

B)3DES

C)ECC

D)ElGamal

Q5) The Vigenère cipher is a polyalphabetic substitution cipher.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Public Key Infrastructure

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/58438

Sample Questions

Q1) A(n)_______________ is a construct of systems,personnel,applications,protocols,technologies,and policies that work together to provide a certain level of protection.

Q2) Which of the following is not one of the three forms of trust models?

A)Hybrid

B)Star

C)Peer-to-peer

D)Hierarchical

Q3) One of the steps necessary to validate a certificate is to

A)Explore private key protection

B)Know certificate authorizations

C)Calculate a message digest for the certificate

D)Check out different types of public key infrastructures

Q4) What is a public key infrastructure?

A)A structure that enables parties to use communications such as e-mail

B)A structure that provides all of the components needed for entities to communicate securely and in a predictable manner

C)A structure that enables secure communications in chat rooms,and when instant messaging and text messaging

D)Is another name for digital signatures

Page 8

To view all questions and flashcards with answers, click on the resource link above.

Chapter 7: Standards and Protocols

Available Study Resources on Quizplus for this Chatper

44 Verified Questions

44 Flashcards

Source URL: https://quizplus.com/quiz/58437

Sample Questions

Q1) Which is the strongest implementation class of WTLS?

A)First class

B)Class 1

C)Class 2

D)Class 3

Q2) IPsec is short for the "second" version of IP.

A)True

B)False

Q3) List and define 5 of the 12 sections detailed by the ISO/IEC 27002 Standard.

Q4) _______________ allows the encapsulation of one packet inside another to hide the original packet.

Q5) What is IPsec?

A)A collection of IP security features designed to introduce security at the network or packet-processing layer

B)An application that encrypts e-mail

C)A standard setting group that dictates internet security standards

D)The company to first introduce the concept of encryption

Q6) _______________ provides a method for implementing a key exchange protocol and for negotiating a security policy.

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Physical Security

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/58436

Sample Questions

Q1) Drive imaging is the term used for copying all the image files from one drive to another.

A)True

B)False

Q2) The best fire extinguisher for an wood,paper and cloth fires is a

A)Class A

B)Class B

C)Class C

D)Class D

Q3) A(n)___________ is a token that can enable cryptographic types of authentication.

Q4) A house key is an example of a(n)__________.

Q5) Explain very simply how biometrics works

Q6) Which of the following are examples of the concept of layered access in physical security?

A)Firewall,IDS,CCTV

B)Fences,gates,mantrap,doors

C)CCTV,walls,antivirus

D)RFID,biometrics,personal firewalls

Q7) What is multiple-factor authentication?

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Network Fundamentals

Available Study Resources on Quizplus for this Chatper

55 Verified Questions

55 Flashcards

Source URL: https://quizplus.com/quiz/58435

Sample Questions

Q1) The method of packaging packets so that they can traverse a network in a secure manner is called _______________.

Q2) LAN and WAN networks can be connected.

A)True

B)False

Q3) Network components connected to the same cable are often called "the backbone" in which topology?

A)Star

B)Bus

C)Ring

D)Hybrid

Q4) Which protocol is responsible for resolving an IP address to a MAC address?

A)DNS

B)ARP

C)RARP

D)ICMP

Q5) _______________ describes network components that are connected to the same cable,often called "the backbone."

Q6) What is NAT and what is it used for?

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Infrastructure Security

Available Study Resources on Quizplus for this Chatper

42 Verified Questions

42 Flashcards

Source URL: https://quizplus.com/quiz/58434

Sample Questions

Q1) The following are steps in securing a workstation EXCEPT:

A)Install NetBIOS and IPX

B)Install antivirus

C)Remove unnecessary software

D)Disable unnecessary user accounts

Q2) What are the different types of removable media?

Q3) What protocol is used to manage IP address space?

A)ICMP

B)DHCP

C)TCP

D)SNMP

Q4) A bridge works on layer 3 of the OSI model.

A)True

B)False

Q5) A hub operates at

A)Layer 1,the physical layer

B)Layer 2,the data link layer

C)Layer 2,the MAC layer

D)Layer 3,the network layer

Q6) What are the four common methods for connecting equipment at the physical layer?

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Authentication and Remote Access

Available Study Resources on Quizplus for this Chatper

46 Verified Questions

46 Flashcards

Source URL: https://quizplus.com/quiz/58433

Sample Questions

Q1) _______________ is the collection of billing and other detail records.

Q2) The main weakness of SSH is that all traffic is sent in the clear.

A)True

B)False

Q3) What does SSH stand for?

A)Simple Security Hardware

B)Secure Socket Help

C)Secure Shell

D)Scientifically Secure Hard Drive

Q4) _______________ is the granting of specific permissions based on the privileges held by the account.

Q5) Protecting only the data portion of a packet is referred to as _______________ protection.

Q6) What does RADIUS stand for?

A)Real Access Device Invisible Users Solution

B)Rational Available Device Incremental Users Service

C)Remote Authentication Dial-In User Service

D)Remote Authentication Device Invisible Users Solution

Q7) Protecting the header information of a packet is referred to as _______________ protection.

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: Wireless

Available Study Resources on Quizplus for this Chatper

43 Verified Questions

43 Flashcards

Source URL: https://quizplus.com/quiz/58432

Sample Questions

Q1) Why is wireless problematic from a security standpoint?

A)There is no control over physical limitations.

B)Insufficient signal strength

C)There is no control over the physical layer of traffic.

D)There is no control over the network.

Q2) WEP was not designed with confidentiality in mind.

A)True

B)False

Q3) Which of the following specifications of 802.11 has the highest speed?

A)g

B)n

C)i

D)s

Q4) _____________ means to make certain that no unauthorized individuals read the packets you transmit over the Internet.

A)Integrity

B)Confidentiality

C)Authentication

D)WTLS

Q5) If unauthorized wireless is set up,it is known as a(n)_______________.

Page 14

To view all questions and flashcards with answers, click on the resource link above.

Chapter 13: Intrusion Detection Systems and Network

Security

Available Study Resources on Quizplus for this Chatper

49 Verified Questions

49 Flashcards

Source URL: https://quizplus.com/quiz/58431

Sample Questions

Q1) Windows Defender does all of the following EXCEPT:

A)Spyware detection and removal

B)Real-time malware protection

C)Spam filtering

D)Examine programs running on your computer

Q2) Content-based signatures detect character patterns and TCP flag settings.

A)True

B)False

Q3) The main purpose of a honeypot is

A)To identify hackers so they can be tracked down by the FBI

B)To slow hackers down by providing an additional layer of security that they must pass before accessing the actual network

C)To distract hackers away from attacking an organization's live network

D)To help security professionals better understand and protect against threats to the system

Q4) What must you do in order to sniff the traffic on all ports on a switch?

A)Nothing;you can see all the traffic on a switch by default.

B)Nothing;a switch does not allow you do see all traffic.

C)Enable port mirroring.

D)Run a cable to each port.

To view all questions and flashcards with answers, click on the resource link above. Page 15

Chapter 14: Baselines

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/58430

Sample Questions

Q1) When hardening Mac OS X,the same guidelines for all UNIX systems apply.

A)True

B)False

Q2) Which of the following is NOT a general step in securing a networking device?

A)Choosing good passwords

B)Password-protecting the console

C)Maintaining SNMP community strings

D)Turning off unnecessary services

Q3) Mac OS X FileVault encrypts files with 3DES encryption.

A)True

B)False

Q4) Which of the following is the command to stop a service in UNIX?

A)Stop

B)Kill

C)End

D)Finish

Q5) List three of the security features of Windows Vista.

Q6) In Solaris,one can use the __________ command to modify the permissions associated with a file or directory.

Q7) List four of the new modifications and capabilities of Windows 2003 Server.

To view all questions and flashcards with answers, click on the resource link above. Page 16

Chapter 15: Types of Attacks and Malicious Software

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/58429

Sample Questions

Q1) List and describe the steps a hacker takes to attack a network.

Q2) The term ___________ refers to software that has been designed for some nefarious purpose.

A)virus

B)worm

C)Trojan horse

D)malware

Q3) Scanning is when an attacker attempts to crash the system with programs such as ping sweep or superscan.

A)True

B)False

Q4) A birthday attack is a type of logic bomb virus that releases its payload on some famous person's birthday,such as Michelangelo.

A)True

B)False

Q5) How can social engineering be used to gain access to a computer network and what is the best way to prevent it from happening?

Q6) Describe some of the types of attacks that can be launched against a network.

Q7) What should be included in a security audit?

To view all questions and flashcards with answers, click on the resource link above. Page 17

Chapter 16: E-Mail and Instant Messaging

Available Study Resources on Quizplus for this Chatper

47 Verified Questions

47 Flashcards

Source URL: https://quizplus.com/quiz/58428

Sample Questions

Q1) A type of malicious code that appears to be a safe program but that actually has a hidden purpose is called a ____________.

A)virus

B)hoax

C)Trojan

D)worm

Q2) Viruses that are scripted to send themselves to other users are known as ______________.

Q3) What TCP port does SMTP use?

A)25

B)110

C)143

D)443

Q4) Securing e-mail is something that must be done by

A)Networking administrators

B)Security administrators

C)Outlook express

D)Users

Q5) A(n)_______________ is a mail server that will accept mail from everyone.

Page 18

Q6) Briefly give two examples of how hoax e-mails work.

To view all questions and flashcards with answers, click on the resource link above.

Chapter 17: Web Components

Available Study Resources on Quizplus for this Chatper

45 Verified Questions

45 Flashcards

Source URL: https://quizplus.com/quiz/58427

Sample Questions

Q1) What are some of the security issues associated with web applications and plug-ins?

Q2) Which is a 100% secure method to download applications from the Internet?

A)Signed applets

B)SSH

C)HTTPS

D)There is none.

Q3) The SFTP protocol incorporates what into FTP?

A)SSL

B)Secure java scripting

C)28 bit encryption key

D)the TCP protocol

Q4) _______________ is an application-level protocol that operates over a wide range of lower level protocols.

Q5) Which of the following do not enhance the security of the browser?

A)Browser plug-ins

B)Patches

C)Disabling javascript

D)Rejecting cookies

Q6) What are some of the security concerns regarding scripting?

To view all questions and flashcards with answers, click on the resource link above. Page 19

Chapter 18: Secure Software Development

Available Study Resources on Quizplus for this Chatper

40 Verified Questions

40 Flashcards

Source URL: https://quizplus.com/quiz/58426

Sample Questions

Q1) Scoring the efforts to reduce the effects of threats occurs in which step of threat modeling?

A)Step 2-Enumerate assets

B)Step 7-Score and rank threats

C)Step 8-Create threat trees

D)Step 9-Determine and score mitigation

Q2) You are interviewing for a job as a software developer.The interviewer asks you to explain good software development practices.

Q3) Testing is not an essential part of the generation of secure code.

A)True

B)False

Q4) Unvalidated input that changes the code functioning in an unintended way is which type of coding error?

A)Canonicalization error

B)Improper output handling

C)Injection

D)Buffer overflow

Q5) _______________ is the systematic application of a series of malformed inputs to test how the program responds.

To view all questions and flashcards with answers, click on the resource link above. Page 20

Chapter 19: Disaster Recovery, Business Continuity, and Organizational Policies

Available Study Resources on Quizplus for this Chatper

53 Verified Questions

53 Flashcards

Source URL: https://quizplus.com/quiz/58425

Sample Questions

Q1) Name at least four high-level policies an organization needs to consider.

Q2) Which security policy establishes an organization's need to take reasonable precautions to demonstrate that it is being responsible in its operations (and to avoid possible litigation)?

A)AUP

B)E-mail policy

C)Due diligence

D)Separation of duties

Q3) What is the term for step-by-step instructions that describe exactly how employees are expected to act in a given situation or to accomplish a specific task?

A)Policies

B)Procedures

C)Standards

D)Usage lists

Q4) The goal of the AUP is to ensure employee productivity,while limiting organizational liability due to inappropriate use of the organization's assets.

A)True

B)False

21

To view all questions and flashcards with answers, click on the resource link above.

Chapter 20: Risk Management

Available Study Resources on Quizplus for this Chatper

42 Verified Questions

42 Flashcards

Source URL: https://quizplus.com/quiz/58424

Sample Questions

Q1) Which of the following is the value for the number of times an event is expected to occur in a year?

A)SLE

B)ALE

C)SRO

D)ARO

Q2) Residual risk is covered by insurance companies.

A)True

B)False

Q3) Which management tool is used for diagramming the interdependencies between project activities,showing the sequence and duration of each activity?

A)Pareto charts

B)Gantt charts

C)Interrelationship digraphs

D)PERT charts

Q4) Once an organization implements a security plan,they can expect to remain secure for an extended period of time.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 22

Chapter 21: Change Management

Available Study Resources on Quizplus for this Chatper

35 Verified Questions

35 Flashcards

Source URL: https://quizplus.com/quiz/58423

Sample Questions

Q1) _______________ is the process of controlling changes to items that have been baselined.

Q2) What is configuration control?

A)Ensures that configuration items are built and maintained according to the requirements,standards,or contractual agreements

B)Ensures that only approved changes to a baseline are allowed to be implemented

C)Ensures all changes made separate from the baseline are well documented and controlled

D)Identifies which assets need to be controlled.

Q3) A configuration item is an asset that needs to be controlled or managed.

A)True

B)False

Q4) Configuration status accounting consists of the procedures for tracking and maintaining data relative to each configuration item in the baseline.

A)True

B)False

Q5) _____________ is the process of identifying which assets need to be managed and controlled.

Q6) A(n)______________ is used to track changes through the change control board.

To view all questions and flashcards with answers, click on the resource link above. Page 23

Chapter 22: Privilege Management

Available Study Resources on Quizplus for this Chatper

39 Verified Questions

39 Flashcards

Source URL: https://quizplus.com/quiz/58422

Sample Questions

Q1) _______________ tells the system how many passwords to remember and does not allow a user to reuse an old password.

Q2) Role-based access control is a method of managing access and privileges based on a set of predefined rules.

A)True

B)False

Q3) _______________ control what the user is allowed to do with the objects on the system.

Q4) Minimum password age policy specifies the number of days a password may be used before it must be changed.

A)True

B)False

Q5) Administrator,root,and superuser are accounts that have the power to do anything that can be done on a system.

A)True

B)False

Q6) Describe methods of account management (SSO,time of day,logical token,account expiration).

Q7) What are the differences between user,group,and role management?

Page 24

To view all questions and flashcards with answers, click on the resource link above.

Chapter 23: Computer Forensics

Available Study Resources on Quizplus for this Chatper

40 Verified Questions

40 Flashcards

Source URL: https://quizplus.com/quiz/58421

Sample Questions

Q1) Only one person is needed to collect and document evidence obtained in performing forensics on a computer system.

A)True

B)False

Q2) What is a software bomb?

A)A firework that destroys all the disks and CDs in your library

B)Any commands executed on the computer that have an adverse effect on the data being investigated

C)Screensavers that show fireworks going off

D)Software trying to access a computer

Q3) To be credible in court proceedings,what are the three standards that evidence must meet?

Q4) Evidence offered by the witness that is not based on the personal knowledge of the witness-but is being offered to prove the truth of the matter asserted-falls under the exclusionary rule.

A)True

B)False

Q5) _______________ performs a function similar to the familiar parity bits,checksum,or cyclical redundancy check (CRC).

To view all questions and flashcards with answers, click on the resource link above. Page 25

Chapter 24: Legal Issues and Ethics

Available Study Resources on Quizplus for this Chatper

40 Verified Questions

40 Flashcards

Source URL: https://quizplus.com/quiz/58420

Sample Questions

Q1) The DMCA protects the rights of recording artists and the music industry.

A)True

B)False

Q2) What is a law passed by a legislative branch of government called?

A)Statutory law

B)Administrative law

C)Common law

D)Blue law

Q3) Which law makes it a crime to knowingly access a computer that is either considered a government computer or used in interstate commerce,or to use a computer in a crime that is interstate in nature?

A)Computer Fraud and Abuse Act

B)Stored Communications Act

C)CAN-SPAM Act

D)Sarbanes-Oxley Act

Q4) _____________ is the unauthorized entry into a computer system via any means.

A)Computer trespass

B)Computer entry

C)Computer hacking

D)Cyber crime

To view all questions and flashcards with answers, click on the resource link above. Page 26

Chapter 25: Privacy

Available Study Resources on Quizplus for this Chatper

40 Verified Questions

40 Flashcards

Source URL: https://quizplus.com/quiz/58419

Sample Questions

Q1) A privacy-enhancing technology called cookie cutter does which of the following?

A)Makes copies of your information for safe keeping

B)Makes sure when you connect to sites you use the same appropriate information

C)Prevents the transfer of cookies between browsers and web servers.

D)Is used by server to prevent the use of unnecessary cookies

Q2) What is PII as it relates to privacy?

Q3) What are some issues associated with technology and privacy?

Q4) In the United States the primary path to privacy is _______.In Europe the primary path to privacy is _________.

A)opt-in;opt-in

B)opt-in;opt-out

C)opt-out;opt-out

D)opt-out;opt-in

Q5) The three things that should govern how good citizenry collects PII are notice,choice,and consent.

A)True

B)False

Q6) _______________ are designed to prevent the transfer of cookies between browsers and web servers.

Q7) Define privacy.

To view all questions and flashcards with answers, click on the resource link above. Page 27

Turn static files into dynamic content formats.

Create a flipbook