Chat with us, powered by LiveChat deadbolt locks - Writeedu

deadbolt locks

What type of testing procedure involves the tester(s) analyzing the company’s security policy and procedures, and reporting any vulnerabilities to management?

Question 1 options:

penetration test

security test

hacking test

ethical hacking test

Question 2

What term best describes a person who hacks computer systems for political or social reasons?

Question 2 options:

cracktivist

hacktivist

sniffer

script kiddy

Question 3

What security certification did the “The International Council of Electronic Commerce Consultants” (EC-Council) develop?

Question 3 options:

Security+

OSSTMM Professional Security Tester (OPST)

Certified Information Systems Security Professional (CISSP)

Certified Ethical Hacker (CEH)

Question 4

Penetration testers and security testers need technical skills to perform their duties effectively.

Question 4 options:

True

False

Question 5

If you work for a company as a security professional, you will most likely be placed on a special team that will conduct penetration tests. What is the standard name for a team made up of security professionals?

Question 5 options:

pen team

blue team

red team

security team

Question 6

Penetration testing can create ethical, technical, and privacy concerns for a company’s management team. What can a security consultant do to ensure the client fully understands the scope of testing that will be performed?

Question 6 options:

create a contractual agreement

create a lab demonstration

create a virtual demonstration

create a slide presentation

Question 7

What organization disseminates research documents on computer and network security worldwide at no cost?

Question 7 options:

EC-Council

SANS

ISECOM

ISC2

Question 8

Even though the Certified Information Systems Security Professional (CISSP) certification is not geared toward the technical IT professional, it has become one of the standards for many security professionals.

Question 8 options:

True

False

Question 9

Port scanning is a noninvasive, nondestructive, and legal testing procedure that is protected by federal law.

Question 9 options:

True

False

Question 10

What name is given to people who break into computer systems with the sole purpose to steal or destroy data?

Question 10 options:

packet monkeys

crackers

script kiddies

bots

Question 11

What penetration model should be used when a company’s management team does not wish to disclose that penetration testing is being conducted?

Question 11 options:

black box

white box

red box

silent box

Question 12

What type of laws should a penetration tester or student learning hacking techniques be aware of?

Question 12 options:

local

state

federal

all of the above

Question 13

What derogatory title do experienced hackers, who are skilled computer operators, give to inexperienced hackers?

Question 13 options:

script kiddies

repetition monkeys

packet sniffers

crackers

Question 14

In the TCP/IP stack, what layer is concerned with physically moving bits across the network’s medium?

Question 14 options:

Internet

Network

Transport

Application

Question 15

What layer, in the TCP/IP protocol stack, is responsible for encapsulating data into segments?

Question 15 options:

Transport layer

Internet layer

Application layer

Network layer

Question 16

In the TCP/IP stack, what layer is concerned with controlling the flow of data, sequencing packets for reassembly, and encapsulating the segment with a TCP or UDP header?

Question 16 options:

Internet

Network

Transport

Application

Question 17

How many host computers can be assigned a valid IPv4 address when using a CIDR /24 prefix?

Question 17 options:

254

512

65,000

16 million

Question 18

What port does the Trivial File Transfer Protocol, or TFTP service use?

Question 18 options:

25

53

69

80

Question 19

What does the acronym TCP represent?

Question 19 options:

Transfer Control Protocol

Transmission Control Protocol

Transfer Congestion Protocol

The Control Protocol

Question 20

What port does the Hypertext Transfer Protocol, or HTTP service use?

Question 20 options:

25

53

69

80

Question 21

What type of network attack relies on guessing a TCP header’s initial sequence number, or ISN?

Question 21 options:

ARP spoofing

Session hijacking

DoS

Man-in-the-middle

Question 22

A hex number is written with two characters, each representing a byte.

Question 22 options:

True

False

Question 23

What is the logical component of a TCP connection that can be assigned to a process that requires network connectivity?

Question 23 options:

ISN

IP

port

SYN

Question 24

In the TCP/IP stack, the Transport layer includes network services and client software.

Question 24 options:

True

False

Question 25

To retrieve e-mail from a mail server, you most likely access port 119.

Question 25 options:

True

False

Question 26

What layer protocols operate as the front end to the lower-layer protocols in the TCP/IP stack?

Question 26 options:

Internet

Network

Transport

Application

Question 27

Which term best describes a hash or code pattern that antivirus software companies use to compare known viruses to every file on a computer?

Question 27 options:

signatures

heuristics

macros

bots

Question 28

The virus signature file is maintained by what type of software?

Question 28 options:

antivirus

keylogger

remote control

firewall

Question 29

When a computer hacker uses multiple compromised computers to carry out a DDOS attack, the compromised computers are usually referred to as which of the following?

Question 29 options:

viruses

zombies

macros

cyborgs

Question 30

What type of malicious program cannot stand on its own and can replicate itself through an executable program attached to an e-mail?

Question 30 options:

shell

virus

keylogger

rootkit

Question 31

What type of virus is used to lock a user’s system, or cloud accounts until the system’s owner complies by paying the attacker a monetary fee?

Question 31 options:

keylogger

rootkit

ransomware

macro

Question 32

The acronym IDS stands for which of the following?

Question 32 options:

Intrusion Detection System

Information Dissemination System

Information Destruction System

Intruder Dispersal System

Question 33

Which type of security is specifically concerned with computers or devices that are part of a network infrastructure?

Question 33 options:

Host security

Server security

Computer security

Network security

Question 34

Which of the following physical security methods provides the ability to secure a company’s assets and document any individuals physical time of entry?

Question 34 options:

rotary locks

combination locks

card access

deadbolt locks

Question 35

Whitelisting allows only approved programs to run on a computer.

Question 35 options:

True

False

Question 36

What type of malicious procedure involves using sniffing tools to capture network communications to intercept confidential information or gather credentials that can be used to extend the attack?

Question 36 options:

eavesdropping

overflowing

injecting

capturing

Question 37

Which type of attack is being carried out when an attacker joins a TCP session and makes both parties think he or she is the other party?

Question 37 options:

A DoS attack

Ping of Death

A buffer overflow attack

Session hijacking

Question 38

A malicious computer program that replicates and propagates itself without having to attach to a host is called which of the following?

Question 38 options:

virus

Trojan

worm

shell

Question 39

A computer hacker may use a phishing e-mail to lure a user into following a malicious link. What type of technique is being used by the computer hacker?

Question 39 options:

mail fraud

heuristics

ransoming

social engineering

Question 40

Which type of program can mitigate some risks associated with malware?

Question 40 options:

shells

bots

antivirus

rootkits

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteEdu. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

Do you need help with this question?

Get assignment help from WriteEdu.com Paper Writing Website and forget about your problems.

WriteEdu provides custom & cheap essay writing 100% original, plagiarism free essays, assignments & dissertations.

With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.

Chat with us today! We are always waiting to answer all your questions.

Click here to Place your Order Now