text
stringlengths 0
108
|
---|
ogy will also be helpful to you. Again, though, if you know the material, you can move
|
around as you need to.
|
Objective Map
|
Table I.1 contains an objective map to show you at a glance where you can find each objec-
|
tive covered. While there are chapters listed for all of these, there are some objectives that
|
are scattered throughout the book. Specifically, tools, systems, and programs get at least
|
touched on in most of the chapters.
|
Table I.1 Objective Map
|
Objective Chapter
|
Tasks
|
1.1 Systems development and management 7, 14
|
1.2 Systems analysis and audits 4, 5, 6, 7
|
1.3 Security testing and vulnerabilities 7, 8
|
1.4 Reporting 1, 7
|
1.5 Mitigation 7, 8
|
1.6 Ethics 1
|
Objective Chapter
|
Knowledge
|
2.1 Background 2, 3
|
2.2 Analysis/assessment 2, 11
|
2.3 Security 3, 13, 14
|
2.4 Tools, systems, programs 4, 5, 6, 7
|
2.5 Procedures/methodology 1, 4, 5, 6, 7, 14
|
2.6 Regulation/policy 1, 14
|
2.7 Ethics 1
|
On the Day of the Exam
|
Plan to arrive at your test center at least 30 minutes before your exam start time. To check
|
in, you’ll need to:
|
■ ■ Show two (2) valid, unexpired forms of personal ID (examples include: government
|
issued IDs, passport, etc.). Both must have your signature, and one of the two must
|
have your photo. For more information about acceptable IDs please visit: https://
|
www.isc2.org/Register-for-Exam, and look under the What You Need to Bring to the
|
Test Center tab for more information.
|
■ ■ Provide your signature.
|
■ ■ Submit to a palm vein scan (unless it’s prohibited by law).
|
■ ■ Have your photo taken. Hats, scarves, and coats may not be worn for your photo. You
|
also can’t wear these items in the test room.
|
The Test Administrator (TA) will give you a short orientation. If you have already arranged
|
for special accommodations for your testing, and (ISC)2 and Pearson VUE have approved them,
|
be sure to go over these with the TA. Then, the TA will escort you to a computer terminal.
|
Let’s Get Started!
|
This book is structured in a way that you will be led through foundational concepts and then
|
through a general methodology for ethical hacking. You can feel free to select your own path-
|
way through the book. Remember, wherever possible, get your hands dirty. Get some experi-
|
ence with tools, tactics, and procedures that you are less familiar with. It will help you a lot.
|
Take the self-assessment. It may help you get a better idea how you can make the best
|
use of this book.
|
1. Which header field is used to reassemble fragmented IP packets?
|
A. Destination address
|
B. IP identification
|
C. Don’t fragment bit
|
D. ToS field
|
2. If you were to see the following in a packet capture, what would you expect was happening?
|
‘ or 1=1;
|
A. Cross-site scripting
|
B. Command injection
|
C. SQL injection
|
D. XML external entity injection
|
3. What method might you use to successfully get malware onto a mobile device?
|
A. Through the Apple Store or Google Play Store
|
B. External storage on an Android
|
C. Third-party app store
|
D. Jailbreaking
|
4. What protocol is used to take a destination IP address and get a packet to a destination on
|
the local network?
|
A. DHCP
|
B. ARP
|
C. DNS
|
D. RARP
|
5. What would be the result of sending the string AAAAAAAAAAAAAAAAA into a variable
|
that has been allocated space for 8 bytes?
|
A. Heap spraying
|
B. SQL injection
|
C. Buffer overflow
|
D. Slowloris attack
|
6. If you were to see the subnet mask 255.255.248.0, what CIDR notation (prefix) would you
|
use to indicate the same thing?
|
A. /23
|
B. /22
|
C. /21
|
D. /20
|
7. What is the primary difference between a worm and a virus?
|
A. A worm uses polymorphic code
|
B. A virus uses polymorphic code
|
C. A worm can self-propagate
|
D. A virus can self-propagate
|
8. How would you calculate risk?
|
A. Probability * loss
|
B. Probability * mitigation factor
|
C. (Loss + mitigation factor) * (loss/probability)
|
D. Probability * mitigation factor
|
9. How does an evil twin attack work?
|
A. Phishing users for credentials
|
B. Spoofing an SSID
|
C. Changing an SSID
|
D. Injecting four-way handshakes
|
10. In order to remove malware in the network before it gets to the endpoint, you would use
|
which of the following?
|
A. Antivirus
|
B. Application layer gateway
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.