ETHICAL
ETHICAL
3. When paying for products online it is best to check the website starts with the
protocol HTTPS and shows a padlock. What is this known as?
1. Security lab
2. Secure Socket Layer
3. Encryption
4. Firewall
4. What is a hackers?
6. Hackers who engage in hacking for illegal purposes are known as which of the
following?
1. Delete files
2. Spy on what you are doing
3. Steal your information
4. Cause inappropriate adverts to appear
8. Personal Information________________
1. process list
2. Remote machines
3. protective scanner
4. Session list
1. Kevin Mitnick
2. Jonny Lee Miller
3. Albert González
4. Jonathan James
1. Steve Jobs
2. Bill Gates
3. Jonny Lee Miller
4. Kevin Mitnick
1. Internet of Technologies
2. Internet over Telephone
3. Internet of Things
4. Internet of Types
1. buggy
2. Patch
3. All of above
4. None of above
Answer: Patch
1. OSINT
2. Daisy Chaining
3. PII
4. Hack Value
Answer: OSINT
1. Sniffing
2. Vulnerability Scanning
3. Gaining Access
4. Reconnaissance
Answer: Reconnaissance
20. Which of the following laws prevents unlawful and authorized interception of
electronic communication?
1. Brute-force
2. Encryption
3. Social engineering
4. Authentication
Answer: Authentication
25. With regards to data stored in countries outside of Europe, GDPR states what?
1. cat
2. chmod
3. cd
4. mkdir
Answer: chmod
27. The Copyright, Designs and Patents Act 1988 is designed to protect all types of IP.
What does IP stand for?
1. Intellectual Patents
2. Individual Property
3. Intellectual Property
4. Individual Patents
1. mkdir
2. less
3. cd
4. cat
Answer: mkdir
1. xdg-open
2. cd
3. cd
4. less
Answer: xdg-open
30. What type of ethical hack tests access to the physical infrastructure?
1. Remote network
2. External network
3. Internal network
4. Physical access
1. chmod
2. cd
3. mkdir
4. cat
Answer: cd
32. Which one of the following laws extends police powers and grants the home office
greater control over operational policing?
1. Gaining access
2. Maintaining access
3. Attack
4. Reconnaissance
Answer: Reconnaissance
1. Internet and Communications companies must not share customers' browser history
with anyone
2. Internet and Communications companies must retain customers' browser history for
up to a year
3. Internet and Communications companies must not keep customers' browser history
for any length of time
4. Internet and Communications companies must delete customers' browser history after
each session
1. GDPR
2. Data Protection Act
3. All of above
4. None of Above
Answer: GDPR
39. Which one of the following is the name of the software that is designed to record
every action which is typed with the aim of stealing sensitive data?
1. Worm
2. Keylogger
3. Keylogger
4. Trojan horse
Answer: Keylogger
1. Hacktivism
2. Activism
3. Active hacking
4. Black-hat hacking
Answer: Hacktivism