1. If you have been contracted to perform an attack against a target system, you are what type of hacker?
- A) White hat
- B) Gray hat
- C) Black hat
- D) Red hat
Show Answer
2. Which of the following describes an attacker who goes after a target to draw attention to a cause?
- A) Terrorist
- B) Criminal
- C) Hacktivist
- D) Script kiddie
Show Answer
3. What level of knowledge about hacking does a script kiddie have?
- A) Low
- B) Average
- C) High
- D) Advanced
Show Answer
4. Which of the following does an ethical hacker require to start evaluating a system?
- A) Training
- B) Permission
- C) Planning
- D) Nothing
Show Answer
5. A white-box test means the tester has which of the following?
- A) No knowledge
- B) Some knowledge
- C) Complete knowledge
- D) Permission
Show Answer
6. Which of the following describes a hacker who attacks without regard for being caught or punished?
- A) Hacktivist
- B) Terrorist
- C) Criminal
- D) Suicide hacker
Show Answer
7. What is a code of ethics?
- A) A law for expected behavior
- B) A description of expected behavior
- C) A corporate policy
- D) A standard for civil conduct
Show Answer
8. The group Anonymous is an example of what?
- A) Terrorists
- B) Script kiddies
- C) Hacktivists
- D) Grayware
Show Answer
9. Companies may require a penetration test for which of the following reasons?
- A) Legal reasons
- B) Regulatory reasons
- C) To perform an audit
- D) To monitor network performance
Show Answer
10. What should a pentester do prior to initiating a new penetration test?
- A) Plan
- B) Study the environment
- C) Get permission
- D) Study the code of ethics
Show Answer
11. Which of the following best describes what a hacktivist does?
- A) Defaces websites
- B) Performs social engineering
- C) Hacks for political reasons
- D) Hacks with basic skills
Show Answer
12. Which of the following best describes what a suicide hacker does?
- A) Hacks with permission
- B) Hacks without stealth
- C) Hacks without permission
- D) Hacks with stealth
Show Answer
13. Which type of hacker may use their skills for both benign and malicious goals at different times?
- A) White hat
- B) Gray hat
- C) Black hat
- D) Suicide hacker
Show Answer
14. What separates a suicide hacker from other attackers?
- A) A disregard for the law
- B) A desire to be helpful
- C) The intent to reform
- D) A lack of fear of being caught
Show Answer
15. Which of the following would most likely engage in the pursuit of vulnerability research?
- A) White hat
- B) Gray hat
- C) Black hat
- D) Suicide hacker
Show Answer
16. Vulnerability research deals with which of the following?
- A) Actively uncovering vulnerabilities
- B) Passively uncovering vulnerabilities
- C) Testing theories
- D) Applying security guidance
Show Answer
17. How is black-box testing performed?
- A) With no knowledge
- B) With full knowledge
- C) With partial knowledge
- D) By a black hat
Show Answer
18. A contract is important because it does what?
- A) Gives permission
- B) Gives test parameters
- C) Gives proof
- D) Gives a mission
Show Answer
19. What does TOE stand for?
- A) Target of evaluation
- B) Time of evaluation
- C) Type of evaluation
- D) Term of evaluation
Show Answer
20. Which of the following best describes a vulnerability?
- A) A worm
- B) A virus
- C) A weakness
- D) A rootkit