96.
Which of the following describes a hacker who attacks without regard for being caught
or punished?
- A.Hacktivist
- B.Terrorist
- C.Criminal
- D.Suicide hacker
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
Much like suicide bombers in the real world, suicide hackers do not worry about getting caught; they are only concerned with their mission. |
97.
The group Anonymous is an example of what?
- A.A law for expected behavior
- B.A description of expected behavior
- C.A corporate policy
- D.A standard for civil conduct
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
Code of ethics is a description of expected behavior. While not adhering to ethics typically does not result in legal action, it can result in expulsion from certain organizations such as EC-Council certification. |
98.
The group Anonymous is an example of what?
- A.Terrorists
- B.Script kiddies
- C.Hacktivists
- D.Grayware
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
Anonymous is an example of hacktivists. |
99.
Companies may require a penetration test for which of the following reasons?
- A.Legal reasons
- B.Regulatory reasons
- C.To perform an audit
- D.To monitor network performance
- Answer & Explanation
- Report
Answer : [A, B, C]
Explanation :
Explanation :
Network performance is not the goal of security audits or penetration tests. |
100.
What should a pentester do prior to initiating a new penetration test?
- A.Plan
- B.Study the environment
- C.Get permission
- D.Study the code of ethics
- Answer & Explanation
- Report
Answer : [C]
Explanation :
Explanation :
Permission is absolutely essential to be obtained prior to performing any sort of test against a system you don’t own. Permission should also be in writing and never verbal. |
- Pages
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40