416 Appendix A ■ Answers to Review Questions
Chapter 1: Getting Started with
Ethical Hacking
- A. A white hat hacker always has permission to perform pen testing against a target system.
- C. A hacktivist is an individual or group that performs hacking and other disruptive activi-
ties with the intention of drawing attention to a particular cause or message. - A. Script kiddies have low or no knowledge of the hacking process but should still be
treated as dangerous. - B. An ethical hacker never performs their services against a target without explicit permis-
sion of the owner of that system. - C. White box testers have complete knowledge of the environment they have been tasked
with attacking. - D. Much like suicide bombers in the real world, suicide hackers do not worry about getting
caught; they are concerned with their mission first. - D. Footprinting is used to gather information about a target environment.
- C. Viruses are the oldest and best known form of malicious code or malware.
- A. A worm is a self-replicating piece of malware that does not require user interaction to
proceed. - C. A Trojan horse relies more on social engineering than on technology to be successful.
- C. A hacktivist engages in mischief for political reasons.
- B. A suicide hacker does not worry about stealth or otherwise concealing their activities but
is more concerned with forwarding an agenda. - B. Grey hat hackers are typically thought of as those that were formally black hats, but have
reformed. However they have been known to use their skills for both benign and malicious
purposes. - D. A suicide hacker’s main difference over other hacker’s is their complete and utter lack of
concern in regards to being caught. - A. White hat hackers are the most likely to engage in research activities; though grey and
black hats may engage in these activities they are not typical. - B. Vulnerability research is a way of passively uncovering weaknesses.
- A. Black box testing is performed with no knowledge to simulate an actual view of what a
hacker would have. - C. A contract gives proof that permission and parameters were established.
bapp01.indd 416 22-07-2014 10:56:35