CEH

(Jeff_L) #1

22 Chapter 1 ■ Getting Started with Ethical Hacking



  1. Which of the following is the purpose of the footprinting process?
    A. Entering a system
    B. Covering tracks
    C. Escalating privileges
    D. Gathering information

  2. Which of the following forms are usually malicious?
    A. Software applications
    B. Scripts
    C. Viruses
    D. Grayware

  3. What is a self-replicating piece of malware?
    A. A worm
    B. A virus
    C. A Trojan horse
    D. A rootkit

  4. What is a piece of malware that relies on social engineering?
    A. A worm
    B. A virus
    C. A Trojan horse
    D. A rootkit

  5. Which of the following best describes what a hacktivist does?
    A. Defaces websites
    B. Performs social engineering
    C. Hacks for political reasons
    D. Hacks with basic skills

  6. Which of the following best describes what a suicide hacker does?
    A. Hacks with permission
    B. Hacks without stealth
    C. Hacks without permission
    D. Hacks with stealth

Free download pdf