FREE Certified Ethical Hacker Trivia Questions and Answers

0%

Which of the following best describes a vulnerability?

Correct! Wrong!

In cybersecurity, vulnerability is a weakness that may be exploited by hackers during a cyber assault to gain unauthorized access to a node or computer system or to do unauthorized operations. Vulnerabilities can allow attackers to do the following: run code, access a system's memory, install malware & to steal, destroy or modify sensitive data.

Which of the following is a programming situation in which one process or thread writes data while another reads it?

Correct! Wrong!

A race condition is a programmed situation or condition in which one function or thread writes or generates data while another function or thread reads that data. If they are not closely synchronized, the data may be read before it is written. There is also a possibility that they altered the data between writing and reading.

Which of the following describes the connection of two or more basic network topologies, each of which has its own nodes?

Correct! Wrong!

When two or more fundamental network topologies (such as star and mesh) are interconnected, a hybrid network topology is produced. The resulting topology will have features of all the topologies that are part of a hybrid topology. This will make each topology less limited by its own weaknesses.

Which of the following do we anticipate data to stay unchanged from the time it is sent until it is received?

Correct! Wrong!

Integrity is characterized as follows: (I) It is intended to safeguard critical data against unauthorized deletion, addition, or alteration. (II) It assures that if an authorized individual makes a change that should not have been made, the damage may be undone.

Which of the following topologies is a communication channel (a single network connection) that enables communication between several computers?

Correct! Wrong!

In a Local Area Network (LAN), a bus topology is one in which all the nodes, hosts, or computers are connected to a single cable. Backbone refers to the cable to which nodes, hosts, or computers connect. If this backbone breaks, communication across the entire segment fails, which means no hosts can communicate.

Who is an entity, like a person or group, that can create a threat?

Correct! Wrong!

The word Threat Agent refers to an individual or organization capable of planning, manifesting, and executing a threat. It is vital to identify who might wish to exploit an organization's assets or secrets and how they would use this information against the business.

Which of the following, in the context of a firm or organization, determines what resources must be safeguarded, how resources should be utilized, and how resources may or should be accessed?

Correct! Wrong!

A security policy is a declaration of purpose or set of written rules pertaining to the resources and organizational structure of an organization or corporation. It explains the following: - What a company considers for security enhancement, what resources require protection, how resources should be utilized and how resources may or should be accessed.

Which of the following is a 4-bit element in the IP header that shows IP version?

Correct! Wrong!

The version field in the IP header shows that the IP version of the packet under examination is present. This parameter displays the number 4 when IPv4 is enabled. The header length is specified as the length of the header and has values between 20 and 60 bytes in 32-bit words.

Media access control typically consists of six octets (8-bit bytes) separated by a colon. What is the representation of the Media Access Control (MAC) address?

Correct! Wrong!

The Media access control (MAC) address is represented or stated using hexadecimal numbers since it is the most convenient way to represent octets. A pair of hexadecimal numbers will encompass the whole range of anticipated byte values, i.e., 00 is 0 and ff is 255.

Which of the following protocols provides data encryption and confidentiality for web-based communication?

Correct! Wrong!

The most used security protocol, Secure Sockets Layer/Transport Layer (SSL/TLS), is used for web-based communication encryption. A collection of methods, rules, and procedures for encrypting sensitive information. SSL and TLS both explain how to generate encryption keys from critical, well-known data and incomplete data that is transmitted from one side to another.

Donn Parker added three additional properties to the CIA TRIAD portfolio in 1998. In CIA TRIAD, Parker included which of these three properties?

Correct! Wrong!

The three extra properties that Parker added to CIA TRIAD are:  Possession (or Control), Authenticity and Utility

Premium Tests $49/mo
FREE April-2024