Practice Exam Sept 2023 Flashcards
(465 cards)
Module 01 Introduction to Ethical Hacking
Which set of regulations is concerned with protecting a patient’s medical records?
A. ISO 2002
B. PCI DSS
C. PII
D. HIPAA/PHI
D
Module 01 Introduction to Ethical Hacking
In which phase of the Cyber Kill Chain would an attacker exfiltrate data from your organization?
A. Weaponization
B. Delivery
C. Actions on Objectives
D. Command and Control
E. Exploitation
C
Module 01 Introduction to Ethical Hacking
Which security strategy requires using several, varying methods to protect IT systems against attacks?
A. Three-way handshake
B. Exponential backoff algorithm
C. Covert channels
D. Defense in depth
D
Module 01 Introduction to Ethical Hacking
During a pen-test, you’ve obtained several employee e-mail addresses from their company website. At which phase of the Cyber Kill Chain would you then create a client-side backdoor in order to send it to the victims via e-mail?
A. Reconnaissance
B. Weaponization
C. Delivery
D. Exploitation
E. Installation
F. Command and Control
G. Actions on Objectives
B
In this scenario, the penetration tester has already completed the first stage of reconnaissance by harvesting the employees’ email addresses from public sources. They are now in the second stage of weaponization, where they are creating a client-side backdoor and attaching it to an email in order to deliver it to the employees.
The next stages of the kill chain would be delivery, where the email is sent to the employees, followed by exploitation, installation, and command and control, where the attacker gains access to the target system and establishes a channel for ongoing communication.
Module 01 Introduction to Ethical Hacking
In which phase of Incident Handling & Response (IH&R) do you analyze the compromised device to find details like type of attack, severity, target, impact, method of propagation, and vulnerabilities exploited?
A. Preparation
B. Incident Recording and Assignment
C. Incident Triage
D. Notification
E. Containment
F. Evidence Gathering and Forensic Analysis
G. Eradication
H. Recovery
I. Post-Incident Activities
C
In this phase, the identified security incidents are analyzed, validated, categorized, and prioritized. The IH&R team further analyzes the compromised device to find incident details such as the type of attack, its severity, target, impact, and method of propagation, and any vulnerabilities it exploited
Module 01 Introduction to Ethical Hacking
Which of these best describes step 3, Delivery, in the Cyber Kill Chain methodology?
A. An intruder creates malware to be used as a malicious attachment to an email.
B. An intruder sends a malicious attachment via email to a target.
C. An intruder’s malware is installed on a target’s machine.
D. An intruder’s malware is triggered when a target opens a malicious email attachment.
B
Module 01 Introduction to Ethical Hacking
What is the process called that can record, log, and resolve events that happen in your company?
A. Metrics
B. Incident management process
C. Internal procedure
D. Security policy
B
Module 01 Introduction to Ethical Hacking
Which best describes white-box testing?
A. The internal operation of a system is only partly accessible to the tester
B. The internal operation of a system is completely known to the tester
C. Only the internal operation of a system is known to the tester
D. Only the external operation of a system is accessible to the tester
B
Module 01 Introduction to Ethical Hacking
Which of these laws was designed to improve the accuracy and accountability of corporate disclosures, and to protect the public from accounting errors and fraudulent activities?
A. SOX
B. HIPAA
C. FedRAMP
D. PCI DSS
A
The Sarbanes-Oxley Act (SOX) was passed by the Congress of the United States in 2002 and is designed to protect members of the public from being defrauded or falling victim to financial errors on the part of businesses or financial entities. SOX compliance is both a matter of staying in line with the law and making sure your organization engages in sound business principles that benefit both the company and its customers.
Module 01 Introduction to Ethical Hacking
Which phase of ethical hacking involves infecting a system with malware, and using phishing to gain access to a system or website?
A. Reconnaissance
B. Scanning
C. Gaining access
D. Maintaining access
C
Module 01 Introduction to Ethical Hacking
You just got an e-mail from someone you’ve never met, claiming that your public website has a zero day vulnerability. The e-mail describes the problem and what you can do to protect yourself from this vulnerability. The e-mail has also been carbon-copied to Microsoft, informing them of the problem that their systems are exposed to. Which type of hacker sent you this e-mail?
A. Black hat
B. Red hat
C. Grey hat
D. White hat
C
Module 01 Introduction to Ethical Hacking
Which best describes gray-box testing?
A. The internal operation of a system is only partly accessible to the tester
B. The internal operation of a system is completely known to the tester
C. Only the internal operation of a system is known to the tester
D. Only the external operation of a system is accessible to the tester
A
Module 01 Introduction to Ethical Hacking
After finding and mitigating the vulnerabilities on your network, some small amount of risk still remains. What is this called?
A. Impact risk
B. Deferred risk
C. Residual risk
D. Inherent risk
C
Module 01 Introduction to Ethical Hacking
Which type of hacker sometimes works offensively, and sometimes works defensively?
A. Suicide hacker
B. Black hat
C. Gray hat
D. White hat
C
Module 01 Introduction to Ethical Hacking
Before a penetration tester can start any hacking activities, it’s most important for her to do which of these?
A. Creating action plan
B. Finding new exploits which can be used during the pentest
C. Preparing a list of targeted systems
D. Ensuring that her activity will be authorized and she will have proper agreement with owners of the targeted system
D
Module 01 Introduction to Ethical Hacking
There has been data-leakage on a workstation, so you go to that station, turn off the power, then remove the keyboard, mouse, and ethernet cable. Which incident-handling step would these activities fall under?
A. Discovery
B. Eradication
C. Containment
D. Recovery
C
Module 01 Introduction to Ethical Hacking
Which type of hacker has no training and only uses basic techniques or tools they found on the internet?
A. White-Hat Hackers
B. Gray-Hat Hackers
C. Black-Hat Hackers
D. Script Kiddies
D
Module 01 Introduction to Ethical Hacking
What makes a penetration test more thorough than a vulnerability scan?
A. A penetration test actively exploits the vulnerabilities in the targeted infrastructure, while a vulnerability scan does not typically involve active exploitation.
B. The tools used by penetration testers tend to have much more comprehensive vulnerability databases.
C. Vulnerability scans only do host discovery and port scanning by default.
D. It is not; a penetration test is often performed by an automated tool, while a vulnerability scan requires active engagement.
A
Module 01 Introduction to Ethical Hacking
Which best describes black-box testing?
A. The internal operation of a system is only partly accessible to the tester
B. The internal operation of a system is completely known to the tester
C. Only the internal operation of a system is known to the tester
D. Only the external operation of a system is accessible to the tester
D
Module 01 Introduction to Ethical Hacking
After assessing the risk of a breach in your web application, you find there is a 40% chance of breach. You implement some controls and now find that the risk of a breach is down to 15%, while your risk threshold for the web application is at 25%. Which of these risk strategies will you most likely employ to continue operations with the most business profit?
A. Avoid the risk
B. Mitigate the risk
C. Accept the risk
D. Introduce more controls to bring the risk to 0%
C
Module 01 Introduction to Ethical Hacking
Federal information systems should have security controls in place, as defined by which of these regulations?
A. PCI-DSS
B. HIPAA
C. NIST-800-53
D. EU Safe Harbor
C
Module 01 Introduction to Ethical Hacking
A risk assessment includes which of these components?
A. Physical security
B. Administrative safeguards
C. DMZ
D. Logical interface
B
Module 01 Introduction to Ethical Hacking
The chance of a hard drive failure is once every four years. The cost to buy a new hard drive is $400. It will require 5 hours to restore the OS and software to the new hard disk. It will require another 5 hours to restore the user data from the last backup to the new hard disk. The recovery tech earns $10/hour. Calculate the SLE, ARO, and ALE. Assume the EF = 1 (100%).
What is the closest approximate cost of this replacement and recovery operation per year?
A. $100
B. $125
C. $500
D. $1500
B
single loss expectancy (SLE)
value of the asset (AV)
exposure factor (EF)
SLE = AV x EF
Annualized rate of occurrence (ARO)
annualized loss expectancy (ALE)
ALE = SLE x ARO
Module 01 Introduction to Ethical Hacking
After being hired to do a pen-test, you and the customer fill out a document that describes all the details of the test. This document protects both the customer as well as your legal liabilities as the tester. Which document is being described?
A. Project Scope
B. Service Level Agreement
C. Rules of Engagement
D. Non-Disclosure Agreement
C. The ROE is established before the start of a security test, and gives the test team authority to conduct defined activities without the need for additional permissions.
B. A service-level agreement (SLA) sets the expectations between the service provider and the customer and describes the products or services to be delivered, the single point of contact for end-user problems, and the metrics by which the effectiveness of the process is monitored and approved.