Q) What initial steps should an ethical hacker to run after being brought into an organization?
a) Start safety tests.
b) Turn final results.
c) Sign a formal contract with the NDA.
d) Evaluate what the organization is trying to protect.
Q) Which of the following guidelines or standard it is associated with the industry’s credit card?
a) Control Objectives for Information and related Technology (COBIT)
b) Sarbanes-Oxley Act (SOX)
c) Health Insurance Portability and Accountability Act (HIPAA)
d) Payments by Card Industry Data Security Standard (PCI DSS)
Q) An attacker has captured a target file that is encrypted with a public key encryption. Which of the following attacks is likely to be used to break the destination file?
a) Timing attack
b) Replay attack
c) attack memory trade-off
d) Chosen plaintext attack
Q) What tool can be used to copy files from USB devices silently?
a) USB Grabber
b) USB Dumper
c) USB Sniffer
d) USB Snoopy
Q) How can a rootkit to bypass Windows 7 operating modes of kernel systems, the code signing policy?
a) Defeating the scanner to detect any change in the code to the kernel
b) Replacing calls patch system with its own version that hides the actions rootkits (attacker)
c) Performing common services for the application process and replacing the actual applications with fake ones
d) clinging to the master boot record to a hard drive and changing the machine’s boot sequence / options