CEH: Ch. 1

Wyjście

Pytanie 1 of 1

  Pozostały Czas


0 [{"id":412303,"quiz_id":"20955","answer_id":null,"answerType_id":"0","created_at":"2018-03-21 16:25:55","updated_at":"2018-03-21 16:26:13","questionName":"How is black-box testing performed?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":16,"explanation":"Black-box testing is performed with no knowledge to simulate an actual view of what a hacker would have.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412305,"quiz_id":"20955","answer_id":null,"answerType_id":"0","created_at":"2018-03-21 16:25:55","updated_at":"2018-03-21 16:26:13","questionName":"What does TOE stand for?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":18,"explanation":"TOE stands for target of evaluation and represents the target being tested.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412306,"quiz_id":"20955","answer_id":null,"answerType_id":"0","created_at":"2018-03-21 16:25:55","updated_at":"2018-03-21 16:26:13","questionName":"Which of the following best describes a vulnerability?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":19,"explanation":"A vulnerability is a weakness. Worms, viruses, and rootkits are forms of malware.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412304,"quiz_id":"20955","answer_id":null,"answerType_id":"0","created_at":"2018-03-21 16:25:55","updated_at":"2018-03-21 16:26:13","questionName":"A contract is important because it does what?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":17,"explanation":"A contract gives proof that permission and parameters were established.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412302,"quiz_id":"20955","answer_id":null,"answerType_id":"0","created_at":"2018-03-21 16:25:55","updated_at":"2018-03-21 16:26:13","questionName":"Vulnerability research deals with which of the following?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":15,"explanation":"Vulnerability research is a way of passively uncovering weaknesses.","question_score_id":null,"lang":null,"questionAudioPath":null}]
412303
0
60
block

How is black-box testing performed?

Wybierz prawidłowe odpowiedzi  

(0/0)












412305
0
60
none
412306
0
60
none
412304
0
60
none
412302
0
60
none