Assessment
- Hackers who use their skills with malicious intent are known as:
A. Ethical hackers
B. White hat hackers
C. Hardware hackers
D. Black hat hackers
- The second stage of the cyber kill chain is:
A. Command and control
B. Reconnaissance
C. Weaponization
D. Delivery
- One of the things that separates black hat from white hat hackers is:
A. Tools
B. Procedures
C. Techniques
D. Ethics
- In the field of information security, CIA stands for:
A. Coverage, Information, Applications
B. Confidentiality, Integrity, Availability
C. Confidentiality, Intelligence, Archiving
D. Coverage, Integrity, Authentication
- The team that encompasses both offensive and defensive techniques bridging the gaps between these skills is called the ______ team:
A. Gray Hats
B. Purple team
C. Red team
D. Blue team
- Which of the following is not an area of attack?
A. Memory
B. Host
C. Application
D. Network
- The one group that does not have a clear definition of where they operate in the security ecosystem is:
A. Black hats
B. Gray hats
C. White hats
D. Blue hats
- Which type of attack targets user tokens?
A. SQL injection
B. Watering hole
C. Man-in-the-middle
D. Kerberoasting
- What is not an area to look at when doing reconnaissance?
A. Company website
B. Watering hole
C. Social networks
D. Job board or listings
- Before a pentest can take place, one of the documents needed is:
A. Network diagram
B. Company organization chart
C. Company 10-K
D. Get out of jail free card