0
praveen1's Avatar
Light Poster
I am just a n00b here and thanks its really gr8 tht ur helping us a lot and thanks 2 the admin as well.
0
peeger1's Avatar, Join Date: Jan 2011
Light Poster
I am new to all this. how much does ethical hacking tyically cost if you were to contract someone....also how long would it take to complete?
0
prathviraj's Avatar, Join Date: Mar 2011
Newbie Member
Thanks a lot...
0
Cleptography's Avatar, Join Date: Sep 2010
Go4Expert Member
Great article, very well constructed.
Cheers-
0
brokencard's Avatar, Join Date: Apr 2011
Newbie Member
thanks for the class man
0
Jitterbud's Avatar, Join Date: Jan 2012
Newbie Member
Question 1:
In 2000, Mafiaboy launched an attack that knocked out eBay and Yahoo! for several hours. This attack targeted which of the following?

A:Availability

__________________________________________________


Question 2:
How many components are in a security evaluation?


D:Three(Stuck on this one, possible to inform me also which ones the components in a security evauluation are please. Many thanks.)
__________________________________________________


Question 3:
Hacker attacks, unauthorized access, and viruses and malware can all be described as what?


B:Threats

__________________________________________________


Question 4:
What is the main federal statute that addresses computer hacking under U.S. Federal Law? Choose one answer.


B:Section 1029

__________________________________________________

Question 5
Which of the following addresses the secrecy and privacy of information?


D: Confidentiality
__________________________________________________


Question 6:
This type of security test might seek to target the CEO?s laptop or the organization's backup tapes to extract critical information, usernames, and passwords. Choose one answer.


C:Stolen equipment

__________________________________________________


Question 7:
Which of the following best describes an attack that altered the contents of two critical files?


D:Integrity

__________________________________________________


Question 8:
Which of the following is the most important step for the ethical hacker to perform during the preassessment?


C:Obtain written permission to hack.

__________________________________________________


Question 9:
This type of security test typically takes on an adversarial role and looks to see what an outsider can access and control.


B:Penetration test

__________________________________________________


Question 10:
Which of the following is one primary difference between a malicious hacker and an ethical hacker?

D:Ethical hackers obtain permission before bringing down servers or stealing credit card
__________________________________________________


Question 11:
Who are the individuals who perform legal security tests while sometimes performing questionable activities?


D:Grayhat hackers
__________________________________________________


Question 12:

Which individuals believe that hacking and defacing websites can promote social change?


C:Hacktivists
0
Digitalsec's Avatar, Join Date: May 2010
Newbie Member
Thanks for sharing.
Your Ethical Hacking basic class tutorials are nice.
one of my friend studying Certified Ethical Cracker Course at infysec Chennai who referred your website, I like your website very much.
0
thanks for all the info
0
rapstarx's Avatar, Join Date: May 2012
Email Reported As Spam
hey guys i wana learn hacking can anyone help me out. im really new in this sorts of things
0
matrix4u's Avatar, Join Date: Sep 2011
Newbie Member
Wow, you are awesome! More grease to your elbow... Thumbs up for you