text
stringlengths 0
108
|
---|
ogy will also be helpful to you. Again, though, if you know the material, you can move |
around as you need to. |
Objective Map |
Table I.1 contains an objective map to show you at a glance where you can find each objec- |
tive covered. While there are chapters listed for all of these, there are some objectives that |
are scattered throughout the book. Specifically, tools, systems, and programs get at least |
touched on in most of the chapters. |
Table I.1 Objective Map |
Objective Chapter |
Tasks |
1.1 Systems development and management 7, 14 |
1.2 Systems analysis and audits 4, 5, 6, 7 |
1.3 Security testing and vulnerabilities 7, 8 |
1.4 Reporting 1, 7 |
1.5 Mitigation 7, 8 |
1.6 Ethics 1 |
Objective Chapter |
Knowledge |
2.1 Background 2, 3 |
2.2 Analysis/assessment 2, 11 |
2.3 Security 3, 13, 14 |
2.4 Tools, systems, programs 4, 5, 6, 7 |
2.5 Procedures/methodology 1, 4, 5, 6, 7, 14 |
2.6 Regulation/policy 1, 14 |
2.7 Ethics 1 |
On the Day of the Exam |
Plan to arrive at your test center at least 30 minutes before your exam start time. To check |
in, you’ll need to: |
■ ■ Show two (2) valid, unexpired forms of personal ID (examples include: government |
issued IDs, passport, etc.). Both must have your signature, and one of the two must |
have your photo. For more information about acceptable IDs please visit: https:// |
www.isc2.org/Register-for-Exam, and look under the What You Need to Bring to the |
Test Center tab for more information. |
■ ■ Provide your signature. |
■ ■ Submit to a palm vein scan (unless it’s prohibited by law). |
■ ■ Have your photo taken. Hats, scarves, and coats may not be worn for your photo. You |
also can’t wear these items in the test room. |
The Test Administrator (TA) will give you a short orientation. If you have already arranged |
for special accommodations for your testing, and (ISC)2 and Pearson VUE have approved them, |
be sure to go over these with the TA. Then, the TA will escort you to a computer terminal. |
Let’s Get Started! |
This book is structured in a way that you will be led through foundational concepts and then |
through a general methodology for ethical hacking. You can feel free to select your own path- |
way through the book. Remember, wherever possible, get your hands dirty. Get some experi- |
ence with tools, tactics, and procedures that you are less familiar with. It will help you a lot. |
Take the self-assessment. It may help you get a better idea how you can make the best |
use of this book. |
1. Which header field is used to reassemble fragmented IP packets? |
A. Destination address |
B. IP identification |
C. Don’t fragment bit |
D. ToS field |
2. If you were to see the following in a packet capture, what would you expect was happening? |
‘ or 1=1; |
A. Cross-site scripting |
B. Command injection |
C. SQL injection |
D. XML external entity injection |
3. What method might you use to successfully get malware onto a mobile device? |
A. Through the Apple Store or Google Play Store |
B. External storage on an Android |
C. Third-party app store |
D. Jailbreaking |
4. What protocol is used to take a destination IP address and get a packet to a destination on |
the local network? |
A. DHCP |
B. ARP |
C. DNS |
D. RARP |
5. What would be the result of sending the string AAAAAAAAAAAAAAAAA into a variable |
that has been allocated space for 8 bytes? |
A. Heap spraying |
B. SQL injection |
C. Buffer overflow |
D. Slowloris attack |
6. If you were to see the subnet mask 255.255.248.0, what CIDR notation (prefix) would you |
use to indicate the same thing? |
A. /23 |
B. /22 |
C. /21 |
D. /20 |
7. What is the primary difference between a worm and a virus? |
A. A worm uses polymorphic code |
B. A virus uses polymorphic code |
C. A worm can self-propagate |
D. A virus can self-propagate |
8. How would you calculate risk? |
A. Probability * loss |
B. Probability * mitigation factor |
C. (Loss + mitigation factor) * (loss/probability) |
D. Probability * mitigation factor |
9. How does an evil twin attack work? |
A. Phishing users for credentials |
B. Spoofing an SSID |
C. Changing an SSID |
D. Injecting four-way handshakes |
10. In order to remove malware in the network before it gets to the endpoint, you would use |
which of the following? |
A. Antivirus |
B. Application layer gateway |