• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

1. Which of the following is best described as a weakness in a defined asset that could

Testbanks Dec 29, 2025 ★★★★★ (5.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

Chapter 1

  • Which of the following is best described as a weakness in a defined asset that could
  • be taken advantage of or exploited by some threat?

*a. vulnerability

  • threat
  • exposure
  • hole
  • What do you call an information resource or asset that is being protected from
  • attacks?

  • key value
  • *b. target of evaluation

  • main asset
  • target asset
  • How does an attacker usually gain access to a system?
  • utilizing a threat vector
  • by a breach in security
  • *c. by a exploiting a vulnerability

  • through an inside exposure
  • An owner's confidence that a system will behave according to its specifications is

referred to as:

  • confidentiality
  • reusability
  • accountability
  • *d. assurance

  • Which three concepts can be arranged in a triangle to depict how products are often
  • developed.

  • functionality, resuability, availability
  • *b. security, functionality, ease of use

  • security, availability, functionality
  • functionality, availability, east of use

(Ethical Hacking and Countermeasures, Attack Phases, 2e EC-Council ) (Test Bank, Correct Answer are marked with*) 1 / 2

  • What is the usually the first phase of an attack?
  • scanning
  • covering tracks
  • gaining access
  • *d. reconnaissance

  • Which tool can be used during the scanning phase of an attack?
  • Spoofing
  • Flooding
  • *c. Traceroute

  • Rootkit
  • Which technology is used to hide data in other data, such as hiding program code in a
  • graphic image?

*a. steganography

  • tunneling
  • encryption
  • spoofing
  • Which of the following is NOT a category of hacker attack?
  • Operating system
  • *b. Host-based

  • Application-level
  • Shrink-wrap code
  • What is one of the three questions that an ethical hacker's evaluation of a client's
  • information system seek to answer?

*a. What can an intruder do with information found on the target system?

  • How much will it cost to patch the target system?
  • Which software must be installed or repaired to secure the system?
  • Which firewall device should be installed on the network perimeter?
  • / 2

User Reviews

★★★★★ (5.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★★

With its step-by-step guides, this document made learning easy. Definitely a impressive choice!

Download Document

Buy This Document

$1.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: Testbanks
Added: Dec 29, 2025
Description:

Chapter 1 1. Which of the following is best described as a weakness in a defined asset that could be taken advantage of or exploited by some threat? *a. vulnerability b. threat c. exposure d. hole ...

Unlock Now
$ 1.00