CEH: Ch. 1

Exit

Question 1 of 1

  Time Left


0 [{"id":412289,"quiz_id":"20955","answer_id":null,"answerType_id":"0","created_at":"2018-03-21 16:25:55","updated_at":"2018-03-21 16:26:13","questionName":"What level of knowledge about hacking does a script kiddie have?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":2,"explanation":"Script kiddies have low or no knowledge of the hacking process but should still be treated as dangerous.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412293,"quiz_id":"20955","answer_id":null,"answerType_id":"0","created_at":"2018-03-21 16:25:55","updated_at":"2018-03-21 16:26:13","questionName":"What is a code of ethics?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":6,"explanation":"Code of ethics is a description of expected behavior. While not adhering to ethics typically does not result in legal action, it can result in expulsion from certain organizations such as EC-Council certification.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412301,"quiz_id":"20955","answer_id":null,"answerType_id":"0","created_at":"2018-03-21 16:25:55","updated_at":"2018-03-21 16:26:13","questionName":"Which of the following would most likely engage in the pursuit of vulnerability research?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":14,"explanation":"White hats are the most likely to engage in research activities, and although gray and black hats may engage in these activities, they are not typical.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412287,"quiz_id":"20955","answer_id":null,"answerType_id":"0","created_at":"2018-03-21 16:25:55","updated_at":"2018-03-21 16:26:13","questionName":"If you have been contracted to perform an attack against a target system, you are what type of hacker?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":0,"explanation":"A white-hat hacker always has permission to perform pen testing against a target system.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412296,"quiz_id":"20955","answer_id":null,"answerType_id":"0","created_at":"2018-03-21 16:25:55","updated_at":"2018-03-21 16:26:13","questionName":"What should a pentester do prior to initiating a new penetration test?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":9,"explanation":"Permission is absolutely essential to be obtained prior to performing any sort of test against a system you don\u2019t own. Permission should also be in writing and never verbal.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412299,"quiz_id":"20955","answer_id":null,"answerType_id":"0","created_at":"2018-03-21 16:25:55","updated_at":"2018-03-21 16:26:13","questionName":"Which type of hacker may use their skills for both benign and malicious goals at different times?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":12,"explanation":"Gray-hat hackers are typically thought of as those that were formally black hats but have reformed. However, they have been known to use their skills for both benign and malicious purposes.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412297,"quiz_id":"20955","answer_id":null,"answerType_id":"0","created_at":"2018-03-21 16:25:55","updated_at":"2018-03-21 16:26:13","questionName":"Which of the following best describes what a hacktivist does?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":10,"explanation":"A hacktivist engages in mischief for political reasons.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412295,"quiz_id":"20955","answer_id":null,"answerType_id":"0","created_at":"2018-03-21 16:25:55","updated_at":"2018-03-21 16:26:13","questionName":"Companies may require a penetration test for which of the following reasons?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":8,"explanation":"Network performance is not the goal of security audits or penetration tests.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412291,"quiz_id":"20955","answer_id":null,"answerType_id":"0","created_at":"2018-03-21 16:25:55","updated_at":"2018-03-21 16:26:13","questionName":"A white-box test means the tester has which of the following?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":4,"explanation":"White-box testers have complete knowledge of the environment they have been tasked with attacking.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412292,"quiz_id":"20955","answer_id":null,"answerType_id":"0","created_at":"2018-03-21 16:25:55","updated_at":"2018-03-21 16:26:13","questionName":"Which of the following describes a hacker who attacks without regard for being caught or punished?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":5,"explanation":"Much like suicide bombers in the real world, suicide hackers do not worry about getting caught; they are only concerned with their mission.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412290,"quiz_id":"20955","answer_id":null,"answerType_id":"0","created_at":"2018-03-21 16:25:55","updated_at":"2018-03-21 16:26:13","questionName":"Which of the following does an ethical hacker require to start evaluating a system?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":3,"explanation":"An ethical hacker never performs their services against a target without explicit permission of the owner of that system.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412300,"quiz_id":"20955","answer_id":null,"answerType_id":"0","created_at":"2018-03-21 16:25:55","updated_at":"2018-03-21 16:26:13","questionName":"What separates a suicide hacker from other attackers?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":13,"explanation":"A suicide hacker\u2019s main difference from other hackers is their complete and utter lack of concern in regard to being caught.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412298,"quiz_id":"20955","answer_id":null,"answerType_id":"0","created_at":"2018-03-21 16:25:55","updated_at":"2018-03-21 16:26:13","questionName":"Which of the following best describes what a suicide hacker does?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":11,"explanation":"A suicide hacker does not worry about stealth or otherwise conceal their activities but is more concerned with forwarding an agenda.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412288,"quiz_id":"20955","answer_id":null,"answerType_id":"0","created_at":"2018-03-21 16:25:55","updated_at":"2018-03-21 16:26:13","questionName":"Which of the following describes an attacker who goes after a target to draw attention to a cause?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":1,"explanation":"A hacktivist is an individual or group that performs hacking and other disruptive activities with the intention of drawing attention to a particular cause or message.","question_score_id":null,"lang":null,"questionAudioPath":null},{"id":412294,"quiz_id":"20955","answer_id":null,"answerType_id":"0","created_at":"2018-03-21 16:25:55","updated_at":"2018-03-21 16:26:13","questionName":"The group Anonymous is an example of what?","questionTimeSeconds":"0","questionTimeMinutes":"1","questionImagePath":null,"position":7,"explanation":"Anonymous is an example of hacktivists.","question_score_id":null,"lang":null,"questionAudioPath":null}]
412289
0
60
block

What level of knowledge about hacking does a script kiddie have?

Select the Correct Answers  

(0/0)












412293
0
60
none
412301
0
60
none
412287
0
60
none
412296
0
60
none
412299
0
60
none
412297
0
60
none
412295
0
60
none
412291
0
60
none
412292
0
60
none
412290
0
60
none
412300
0
60
none
412298
0
60
none
412288
0
60
none
412294
0
60
none