My answers are in bold, though it's an 1.5 years old thread, I have just posted my answers to get to know the correct one:
In 2000, Mafiaboy launched an attack that knocked out eBay and Yahoo! for several hours. This attack targeted which of the following?
How many components are in a security evaluation?
Hacker attacks, unauthorized access, and viruses and malware can all be described as what?
What is the main federal statute that addresses computer hacking under U.S. Federal Law? Choose one answer.
Which of the following addresses the secrecy and privacy of information?
D: Confidentiality__________________________________________________ _________________________________________
This type of security test might seek to target the CEO?s laptop or the organization?s backup tapes to extract critical information, usernames, and passwords. Choose one answer.
D:Insider attack __________________________________________________ _________________________________________
Which of the following best describes an attack that altered the contents of two critical files?
Which of the following is the most important step for the ethical hacker to perform during the preassessment?
A:Obtain permission to hack
B:Hack the web server.
C:Obtain written permission to hack.
D:Gather information about the target.
This type of security test typically takes on an adversarial role and looks to see what an outsider can access and control.
D:High level evaluation
Which of the following is one primary difference between a malicious hacker and an ethical hacker?
A:Ethical hackers use the same methods but strive to do no harm
B:Malicious hackers are more advanced than ethical hackers because they can use any
C:Malicious hackers use different tools and techniques than ethical hackers do
D:Ethical hackers obtain permission before bringing down servers or stealing credit card__________________________________________________ _________________________________________
Who are the individuals who perform legal security tests while sometimes performing questionable activities?
D:Grayhat hackers __________________________________________________ _________________________________________
Which individuals believe that hacking and defacing websites can promote social change?