Hi, XXxxImmortalxxXX

My answers are in bold, though it's an 1.5 years old thread, I have just posted my answers to get to know the correct one:

Question 1:
In 2000, Mafiaboy launched an attack that knocked out eBay and Yahoo! for several hours. This attack targeted which of the following?

A:AvailabilityB:Integrity
C:Confidentiality
D:Authentication
__________________________________________________ _________________________________________

Question 2:
How many components are in a security evaluation?

A:Five
B:Four
C:Two
D:Three__________________________________________________ _________________________________________

Question 3:
Hacker attacks, unauthorized access, and viruses and malware can all be described as what?

A:Risk
B:Threats
C:Exploits
D:Vulnerabilities
__________________________________________________ _________________________________________

Question 4:
What is the main federal statute that addresses computer hacking under U.S. Federal Law? Choose one answer.

A:Section 2701
B:Section 1029
C:Section 2510
D:Section 1028
__________________________________________________ _________________________________________

Question 5
Which of the following addresses the secrecy and privacy of information?

A:Availability
B:Authentication
C:Integrity
D: Confidentiality__________________________________________________ _________________________________________

Question 6:
This type of security test might seek to target the CEO?s laptop or the organization?s backup tapes to extract critical information, usernames, and passwords. Choose one answer.

A:Physical entry
B:Outsider attack
C:Stolen equipment
D:Insider attack __________________________________________________ _________________________________________

Question 7:
Which of the following best describes an attack that altered the contents of two critical files?

A:Authentication
B:Confidentiality
C:Availability
D:Integrity
__________________________________________________ _________________________________________

Question 8:
Which of the following is the most important step for the ethical hacker to perform during the preassessment?

A:Obtain permission to hack
B:Hack the web server.
C:Obtain written permission to hack.
D:Gather information about the target.
__________________________________________________ _________________________________________

Question 9:
This type of security test typically takes on an adversarial role and looks to see what an outsider can access and control.

A:Policy assessment
B:Penetration test
C:Network evaluation
D:High level evaluation
__________________________________________________ _________________________________________

Question 10:
Which of the following is one primary difference between a malicious hacker and an ethical hacker?

A:Ethical hackers use the same methods but strive to do no harm
B:Malicious hackers are more advanced than ethical hackers because they can use any
C:Malicious hackers use different tools and techniques than ethical hackers do
D:Ethical hackers obtain permission before bringing down servers or stealing credit card__________________________________________________ _________________________________________

Question 11:
Who are the individuals who perform legal security tests while sometimes performing questionable activities?

A:Crackers
B:Ethical hackers
C:Whitehat hackers
D:Grayhat hackers __________________________________________________ _________________________________________

Question 12:

Which individuals believe that hacking and defacing websites can promote social change?

A:Ethical hackers
B:Blackhat hackers
C:Hacktivists
D:Grayhat hackers