Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Certified Examination Hacker Examination 1
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
What is a set of communications protocols that lets the hosts in a network talk to one another?
Correct
TCP/IP is a set of communications protocols that lets the hosts in a network talk to one another
Incorrect
TCP/IP is a set of communications protocols that lets the hosts in a network talk to one another
-
Question 2 of 10
2. Question
These groups of hackers are thought to be the good guys, the ethical hackers
Correct
White hats are a group of hackers that are thought to be the good guys, the ethical hackers
Incorrect
White hats are a group of hackers that are thought to be the good guys, the ethical hackers
-
Question 3 of 10
3. Question
In 1983, The U.S. Department of Defense worked with the NSA to create what group?
Correct
In 1983, The U.S. Department of Defense worked with the NSA to create the National Computer Security Center (NCSC)
Incorrect
In 1983, The U.S. Department of Defense worked with the NSA to create the National Computer Security Center (NCSC)
-
Question 4 of 10
4. Question
This is a method of access control in which a security administrator controls the security policy.
Correct
Mandatory Access Control (MAC) is a method of access control in which a security administrator controls the security policy.
Incorrect
Mandatory Access Control (MAC) is a method of access control in which a security administrator controls the security policy.
-
Question 5 of 10
5. Question
This is a method of access policy where the user has control over the security policy
Correct
Discretionary Access Control (DAC) is a method of access policy where the user has control over the security policy
Incorrect
Discretionary Access Control (DAC) is a method of access policy where the user has control over the security policy
-
Question 6 of 10
6. Question
If you need to scout for information that gives you insight about your target, what should you do?
Correct
In the footprinting stage, you scout for information that gives you insight into your target.
Incorrect
In the footprinting stage, you scout for information that gives you insight into your target.
-
Question 7 of 10
7. Question
These are the groups of hackers that are thought to be the bad guys, the crackers
Correct
Black hats are the groups of hackers that are thought to be the bad guys, the crackers
Incorrect
Black hats are the groups of hackers that are thought to be the bad guys, the crackers
-
Question 8 of 10
8. Question
There are many methods in footprinting. Which of the following is NOT an example?
Correct
Radio Footprinting is not a method of footprinting
Incorrect
Radio Footprinting is not a method of footprinting
-
Question 9 of 10
9. Question
Politically motivated hackers that cause attacks are said to be participating in?
Correct
Politically motivated hackers that cause attacks are said to be participating in hacktivism
Incorrect
Politically motivated hackers that cause attacks are said to be participating in hacktivism
-
Question 10 of 10
10. Question
Larry is a manager at a security firm. One day, he realizes that he is going to be fired the next day. He decided to put malware in the firm’s system, without thinking about getting caught. Larry is an example of what type of hacker?
Correct
Larry is an example of a suicide hacker.
Incorrect
Larry is an example of a suicide hacker.