True/False
Indicate whether the statement is true or false.
_T_ 1. An ethical hacker is a person who performs most of the same activities a cracker does, but with the owner or company’s permission.
__T__ 2. Even though the Certified Information Systems Security Professional (CISSP) certification is not geared toward the technical IT professional, it has become one of the standards for many security professionals.
__F__ 3. To retrieve e-mail from a mail server, you most likely access port 119.
__T__ 4. An octal digit can be represented with only three bits because the largest digit in octal is seven.
__F__ 5. A hex number is written with two characters, each representing a byte.
__F_ 6. Macro viruses are hard to create.
__T__ 7. Computer crime is the fastest growing type of crime worldwide.
__T__ 8. To limit the amount of information a company makes public, you should have a good understanding of what a competitor would do to discover confidential information.
_F___ 9. The HTTP CONNECT method starts a remote application-layer loopback of the request message.
_F___ 10. A NetBIOS name does not need to be unique on a network.
Multiple Choice
Identify the choice that best completes the statement or answers the question.
__C__ 11. ____ takes penetration testing to a higher level.
a.
Hacking
c.
Security testing
b.
Cracking
d.
Packet sniffing
__A__ 12. Some hackers are skillful computer operators, but others are younger inexperienced people who experienced hackers refer to as ____.
a.
script kiddies
c.
packet sniffers
b.
repetition monkeys
d.
crackers
__D__ 13. The International Council of Electronic Commerce Consultants (EC-Council) has developed a certification designation called ____.
a.
CompTIA Security+
b.
OSSTMM Professional Security Tester (OPST)
c.
Certified Information Systems Security Professional (CISSP)
d.
Certified Ethical Hacker (CEH)
__A__ 14. The SysAdmin,Audit,Network,