2
Ethical Hacking (REVIEW QUESTIONS) 1. A penetration tester should possess which of the following attributes? (Choose all that apply.) a. Good listening skills b. Knowledge of networking and computer technology c. Good verbal and written communication skills d. An interest in securing networks and computer systems 2. What three models do penetration or security testers use to conduct tests (covered last week)? 3. List the three components of the TCP/IP three-way handshake. 4. List the six flags of a TCP packet. 5. What is the main purpose of malware? 6. List three types of malware. 7. To reduce the risk of a virus attack on a network, you should do which of the following? a. Use antivirus software.

Ethical Hacking

Embed Size (px)

DESCRIPTION

HJ

Citation preview

Page 1: Ethical Hacking

Ethical Hacking (REVIEW QUESTIONS)

1. A penetration tester should possess which of the following attributes? (Choose all that apply.)

a. Good listening skills

b. Knowledge of networking and computer technology

c. Good verbal and written communication skills

d. An interest in securing networks and computer systems

2. What three models do penetration or security testers use to conduct tests (covered last week)?

3. List the three components of the TCP/IP three-way handshake.

4. List the six flags of a TCP packet.

5. What is the main purpose of malware?

6. List three types of malware.

7. To reduce the risk of a virus attack on a network, you should do which of the following?

a. Use antivirus software.

b. Educate users about opening attachments from suspicious e-mail

c. Keep virus signatures files current.

d. All of the above 

Page 2: Ethical Hacking