Go4Expert

Go4Expert (http://www.go4expert.com/)
-   Ethical hacking Tips (http://www.go4expert.com/articles/ethical-hacking-tutorials/)
-   -   Ethical Hacking Basics Class part 1 (http://www.go4expert.com/articles/ethical-hacking-basics-class-part-1-t11925/)

naimish 1Jul2009 12:38

Re: Ethical Hacking Basics Class part 1
 
Quote:

Originally Posted by !Newbie! (Post 50944)

Sorry but I got this :
The webpage cannot be found

!Newbie! 1Jul2009 12:42

Re: Ethical Hacking Basics Class part 1
 
Quote:

Originally Posted by naimish (Post 50942)
u mean PEN Drive ? USB Drive ?

No, pen testing is penetration testing...
USB hacking is hacking done through portable devices...

naimish 1Jul2009 12:43

Re: Ethical Hacking Basics Class part 1
 
Quote:

Originally Posted by !Newbie! (Post 50946)
No, pen testing is penetration testing...
USB hacking is hacking done through portable devices...

Yeah, I tried it, but it was only fun.....is there any extreme trick for it ?

shabbir 1Jul2009 13:25

Re: Ethical Hacking Basics Class part 1
 
Corrected the link which should not have a - at the end.

naimish 1Jul2009 13:47

Re: Ethical Hacking Basics Class part 1
 
Quote:

Originally Posted by shabbir (Post 50952)
Corrected the link which should not have a - at the end.

Thanks, now I got it :)

!Newbie! 1Jul2009 15:40

Re: Ethical Hacking Basics Class part 1
 
Quote:

Originally Posted by naimish (Post 50947)
Yeah, I tried it, but it was only fun.....is there any extreme trick for it ?

No extreme trick as such which am aware currently, will look out and let you know if I find any...

Adbest 28May2010 23:34

Re: Ethical Hacking Basics Class part 1
 
yeah. i have watched a bit of the movie too. The hackers says his handle is rat ;)

unni krishnan.r 3Jun2010 18:34

Re: Ethical Hacking Basics Class part 1
 
do anybody can Hack

Tuhin Banerjee 12Dec2010 18:26

Re: Ethical Hacking Basics Class part 1
 
Hi, XXxxImmortalxxXX

My answers are in bold, though it's an 1.5 years old thread, I have just posted my answers to get to know the correct one:

Question 1:
In 2000, Mafiaboy launched an attack that knocked out eBay and Yahoo! for several hours. This attack targeted which of the following?

A:AvailabilityB:Integrity
C:Confidentiality
D:Authentication
__________________________________________________ _________________________________________

Question 2:
How many components are in a security evaluation?

A:Five
B:Four
C:Two
D:Three__________________________________________________ _________________________________________

Question 3:
Hacker attacks, unauthorized access, and viruses and malware can all be described as what?

A:Risk
B:Threats
C:Exploits
D:Vulnerabilities
__________________________________________________ _________________________________________

Question 4:
What is the main federal statute that addresses computer hacking under U.S. Federal Law? Choose one answer.

A:Section 2701
B:Section 1029
C:Section 2510
D:Section 1028
__________________________________________________ _________________________________________

Question 5
Which of the following addresses the secrecy and privacy of information?

A:Availability
B:Authentication
C:Integrity
D: Confidentiality__________________________________________________ _________________________________________

Question 6:
This type of security test might seek to target the CEO?s laptop or the organization?s backup tapes to extract critical information, usernames, and passwords. Choose one answer.

A:Physical entry
B:Outsider attack
C:Stolen equipment
D:Insider attack __________________________________________________ _________________________________________

Question 7:
Which of the following best describes an attack that altered the contents of two critical files?

A:Authentication
B:Confidentiality
C:Availability
D:Integrity
__________________________________________________ _________________________________________

Question 8:
Which of the following is the most important step for the ethical hacker to perform during the preassessment?

A:Obtain permission to hack
B:Hack the web server.
C:Obtain written permission to hack.
D:Gather information about the target.
__________________________________________________ _________________________________________

Question 9:
This type of security test typically takes on an adversarial role and looks to see what an outsider can access and control.

A:Policy assessment
B:Penetration test
C:Network evaluation
D:High level evaluation
__________________________________________________ _________________________________________

Question 10:
Which of the following is one primary difference between a malicious hacker and an ethical hacker?

A:Ethical hackers use the same methods but strive to do no harm
B:Malicious hackers are more advanced than ethical hackers because they can use any
C:Malicious hackers use different tools and techniques than ethical hackers do
D:Ethical hackers obtain permission before bringing down servers or stealing credit card__________________________________________________ _________________________________________

Question 11:
Who are the individuals who perform legal security tests while sometimes performing questionable activities?

A:Crackers
B:Ethical hackers
C:Whitehat hackers
D:Grayhat hackers __________________________________________________ _________________________________________

Question 12:

Which individuals believe that hacking and defacing websites can promote social change?

A:Ethical hackers
B:Blackhat hackers
C:Hacktivists
D:Grayhat hackers

linux7802 22Dec2010 19:21

Re: Ethical Hacking Basics Class part 1
 
Hi,

Thank you , its really its very useful.


All times are GMT +5.5. The time now is 21:15.