ThatQuiz Test Library Take this test now
FORMATIVE TEST1
Contributed by: Macha
  • 1. _____________ is the technique used in business organizations and firms to protect IT assets.
A) Ethical Hacking
B) Unethical Hacking
  • 2. What is the primary goal of ethical hacker
A) Avoiding detections
B) Resolving security vulnerabilities
  • 3. What hacker do
A) Access computer system or network without authorization from owner
B) Access computer system or network with authorization from owne
  • 4. What cracker do
A) Break into systems to steal or destroy data for fun
B) Doesn't break into systems to steal or destroy data for fun
  • 5. What is penetration tester do
A) Tester only reports findings, does not solve problems
B) Tester only reports findings, and solve problems
  • 6. Which tester provides solutions to secure or protect network
A) Penetration tester
B) Security tester
  • 7. What TigerBox contains
A) Collection of websites for hacking tools
B) Collection of OS's and hacking tools
  • 8. In white box testing model, tester knows
A) Partial information about organization is provided
B) Complete information about company is provided
  • 9. Do you think performing black box testing is difficult ?
A) Yes
B) No
  • 10. Gray box model is the combination of ---------
A) Black box and pink box
B) Black box and white box
  • 11. Full form of CEH
A) Certification for ethical hacker
B) Certified ethical hacker
  • 12. Full form of SANS institute
A) SysAdmin, Audit, Network, Security
B) SysAdmin, Audit, Network, Scooter
  • 13. As a security tester, you must be aware of what you're allowed to do and what you shouldn't do?
A) Yes
B) No
  • 14. Is port scanning legal ?
A) some states deem it legal
B) No
  • 15. As a security tester, what you cannot do legally
A) Installing Operating system
B) Installine worms or virus
  • 16. Malicious software includes
A) Virus, worms, trojan horses
B) Insects
  • 17. What antivirus software do
A) Detects and removes viruses
B) Install virus in system
  • 18. ASCII character of 'A'
A) 65
B) 66
  • 19. Full form of DoS
A) Denial of Service
B) Denial of server
  • 20. What does DoS attack will do
A) Prevents legitimate users from accessing network
B) Prevents hackers from accessing network
Created with That Quiz — the math test generation site with resources for other subject areas.