yeahhub.com
Open in
urlscan Pro
2a02:4780:23:9e76:d35d:6d8f:a2dd:85c8
Public Scan
Submitted URL: http://yeahhub.com/cehv9-practice-exam-questions/chapter1-introduction.php
Effective URL: https://yeahhub.com/cehv9-practice-exam-questions/chapter1-introduction.php
Submission: On August 09 via manual from IN — Scanned from NL
Effective URL: https://yeahhub.com/cehv9-practice-exam-questions/chapter1-introduction.php
Submission: On August 09 via manual from IN — Scanned from NL
Form analysis
0 forms found in the DOMText Content
INTRODUCTION CEHv9 - Practice Exam Questions with Answers * Scroll More * Back to Main CONTENTS -------------------------------------------------------------------------------- * Assessment Test * Introduction * System Fundamentals * Cryptography * Footprinting * Scanning * Enumeration * System Hacking * Malware * Sniffers * Social Engineering * Denial of Service * Session Hijacking * Web Servers & Applications * SQL Injection * Hacking Wi-Fi & Bluetooth * Mobile Device Security * Evasion * Cloud Technologies & Security * Physical Security Total No. of Questions = 20 -------------------------------------------------------------------------------- 1. If you have been contracted to perform an attack against a target system, you are what type of hacker? * A) White hat * B) Gray hat * C) Black hat * D) Red hat SHOW ANSWER The Correct Answer is:- A -------------------------------------------------------------------------------- 2. Which of the following describes an attacker who goes after a target to draw attention to a cause? * A) Terrorist * B) Criminal * C) Hacktivist * D) Script kiddie SHOW ANSWER The Correct Answer is:- C -------------------------------------------------------------------------------- 3. What level of knowledge about hacking does a script kiddie have? * A) Low * B) Average * C) High * D) Advanced SHOW ANSWER The Correct Answer is:- A -------------------------------------------------------------------------------- 4. Which of the following does an ethical hacker require to start evaluating a system? * A) Training * B) Permission * C) Planning * D) Nothing SHOW ANSWER The Correct Answer is:- B -------------------------------------------------------------------------------- 5. A white-box test means the tester has which of the following? * A) No knowledge * B) Some knowledge * C) Complete knowledge * D) Permission SHOW ANSWER The Correct Answer is:- C -------------------------------------------------------------------------------- 6. Which of the following describes a hacker who attacks without regard for being caught or punished? * A) Hacktivist * B) Terrorist * C) Criminal * D) Suicide hacker SHOW ANSWER The Correct Answer is:- D -------------------------------------------------------------------------------- 7. What is a code of ethics? * A) A law for expected behavior * B) A description of expected behavior * C) A corporate policy * D) A standard for civil conduct SHOW ANSWER The Correct Answer is:- B -------------------------------------------------------------------------------- 8. The group Anonymous is an example of what? * A) Terrorists * B) Script kiddies * C) Hacktivists * D) Grayware SHOW ANSWER The Correct Answer is:- C -------------------------------------------------------------------------------- 9. Companies may require a penetration test for which of the following reasons? * A) Legal reasons * B) Regulatory reasons * C) To perform an audit * D) To monitor network performance SHOW ANSWER The Correct Answer is:- A -------------------------------------------------------------------------------- 10. What should a pentester do prior to initiating a new penetration test? * A) Plan * B) Study the environment * C) Get permission * D) Study the code of ethics SHOW ANSWER The Correct Answer is:- C -------------------------------------------------------------------------------- 11. Which of the following best describes what a hacktivist does? * A) Defaces websites * B) Performs social engineering * C) Hacks for political reasons * D) Hacks with basic skills SHOW ANSWER The Correct Answer is:- C -------------------------------------------------------------------------------- 12. Which of the following best describes what a suicide hacker does? * A) Hacks with permission * B) Hacks without stealth * C) Hacks without permission * D) Hacks with stealth SHOW ANSWER The Correct Answer is:- B -------------------------------------------------------------------------------- 13. Which type of hacker may use their skills for both benign and malicious goals at different times? * A) White hat * B) Gray hat * C) Black hat * D) Suicide hacker SHOW ANSWER The Correct Answer is:- B -------------------------------------------------------------------------------- 14. What separates a suicide hacker from other attackers? * A) A disregard for the law * B) A desire to be helpful * C) The intent to reform * D) A lack of fear of being caught SHOW ANSWER The Correct Answer is:- D -------------------------------------------------------------------------------- 15. Which of the following would most likely engage in the pursuit of vulnerability research? * A) White hat * B) Gray hat * C) Black hat * D) Suicide hacker SHOW ANSWER The Correct Answer is:- A -------------------------------------------------------------------------------- 16. Vulnerability research deals with which of the following? * A) Actively uncovering vulnerabilities * B) Passively uncovering vulnerabilities * C) Testing theories * D) Applying security guidance SHOW ANSWER The Correct Answer is:- B -------------------------------------------------------------------------------- 17. How is black-box testing performed? * A) With no knowledge * B) With full knowledge * C) With partial knowledge * D) By a black hat SHOW ANSWER The Correct Answer is:- A -------------------------------------------------------------------------------- 18. A contract is important because it does what? * A) Gives permission * B) Gives test parameters * C) Gives proof * D) Gives a mission SHOW ANSWER The Correct Answer is:- C -------------------------------------------------------------------------------- 19. What does TOE stand for? * A) Target of evaluation * B) Time of evaluation * C) Type of evaluation * D) Term of evaluation SHOW ANSWER The Correct Answer is:- A -------------------------------------------------------------------------------- 20. Which of the following best describes a vulnerability? * A) A worm * B) A virus * C) A weakness * D) A rootkit SHOW ANSWER The Correct Answer is:- C Copyright © 2017. All Rights Reserved | Developed by Yeah Hub Team Yeahhub