Certified Ethical Hacker 1

Certified Ethical Hacker 1

University

10 Qs

quiz-placeholder

Similar activities

Quizomania-2024 Round 1

Quizomania-2024 Round 1

University

15 Qs

คิดในใจ

คิดในใจ

12th Grade - University

10 Qs

Session 3

Session 3

University

13 Qs

Defense Expo Quiz

Defense Expo Quiz

University

10 Qs

GKA2043 Quiz 1

GKA2043 Quiz 1

University

10 Qs

PROFITABILITY RATIOS & MARKET TESTS

PROFITABILITY RATIOS & MARKET TESTS

University

10 Qs

Training External

Training External

University

15 Qs

PIPING TECHNIQUES

PIPING TECHNIQUES

9th Grade - University

10 Qs

Certified Ethical Hacker 1

Certified Ethical Hacker 1

Assessment

Quiz

Other

University

Practice Problem

Hard

Created by

Evgeny Stroev

Used 19+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

The Payment Card Industry Data Security Standard (PCI DSS) contains six different categories of control objectives. Each objective contains one or more requirements, which must be followed in order to achieve compliance. Which of the following requirements would best fit under the objective, "Implement strong access control measures"?

Regularly test security systems and processes.

Encrypt transmission of cardholder data across open, public networks.

Assign a unique ID to each person with computer access.

Use and regularly update anti-virus software on all systems commonly affected by malware.

2.

MULTIPLE CHOICE QUESTION

3 mins • 5 pts

Which of the following act requires employer's standard national numbers to identify them on standard transactions?

SOX

HIPAA

DMCA

PCI DSS

3.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Which of the following is an NMAP script that could help detect HTTP Methods such as GET, POST, HEAD, PUT, DELETE, TRACE?

http-git

http-headers

http enum

http-methods

4.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Sid is a judge for a programming contest. Before the code reaches him it goes through a restricted OS and is tested there. If it passes, then it moves onto Sid. What is this middle step called?

Fuzzy-testing the code

Third party running the code

Sandboxing the code

String validating the code

5.

MULTIPLE CHOICE QUESTION

3 mins • 5 pts

What is the process of logging, recording, and resolving events that take place in an organization?

Incident Management Process

Protection Policy

Security Policy

Metrics

6.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

A hacker has managed to gain access to a Linux host and stolen the password file from /etc/passwd. How can he use it?

The password file does not contain the passwords themselves.

He can open it and read the user ids and corresponding passwords.

He can open it and read the user ids and corresponding passwords.

He cannot read it because it is encrypted.

7.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Darius is analysing IDS logs. During the investigation, he noticed that there was nothing suspicious found and an alert was triggered on normal web application traffic. He can mark this alert as:

False-Negative

False-Positive

True-Positive

False-Signature

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?