text
stringlengths
0
108
ogy will also be helpful to you. Again, though, if you know the material, you can move
around as you need to.
Objective Map
Table I.1 contains an objective map to show you at a glance where you can find each objec-
tive covered. While there are chapters listed for all of these, there are some objectives that
are scattered throughout the book. Specifically, tools, systems, and programs get at least
touched on in most of the chapters.
Table I.1 Objective Map
Objective Chapter
Tasks  
1.1 Systems development and management 7, 14
1.2 Systems analysis and audits 4, 5, 6, 7
1.3 Security testing and vulnerabilities 7, 8
1.4 Reporting 1, 7
1.5 Mitigation 7, 8
1.6 Ethics 1
Objective Chapter
Knowledge  
2.1 Background 2, 3
2.2 Analysis/assessment 2, 11
2.3 Security 3, 13, 14
2.4 Tools, systems, programs 4, 5, 6, 7
2.5 Procedures/methodology 1, 4, 5, 6, 7, 14
2.6 Regulation/policy 1, 14
2.7 Ethics 1
On the Day of the Exam
Plan to arrive at your test center at least 30 minutes before your exam start time. To check
in, you’ll need to:
■ ■ Show two (2) valid, unexpired forms of personal ID (examples include: government
issued IDs, passport, etc.). Both must have your signature, and one of the two must
have your photo. For more information about acceptable IDs please visit: https://
www.isc2.org/Register-for-Exam, and look under the What You Need to Bring to the
Test Center tab for more information.
■ ■ Provide your signature.
■ ■ Submit to a palm vein scan (unless it’s prohibited by law).
■ ■ Have your photo taken. Hats, scarves, and coats may not be worn for your photo. You
also can’t wear these items in the test room.
The Test Administrator (TA) will give you a short orientation. If you have already arranged
for special accommodations for your testing, and (ISC)2 and Pearson VUE have approved them,
be sure to go over these with the TA. Then, the TA will escort you to a computer terminal.
Let’s Get Started!
This book is structured in a way that you will be led through foundational concepts and then
through a general methodology for ethical hacking. You can feel free to select your own path-
way through the book. Remember, wherever possible, get your hands dirty. Get some experi-
ence with tools, tactics, and procedures that you are less familiar with. It will help you a lot.
Take the self-assessment. It may help you get a better idea how you can make the best
use of this book.
1. Which header field is used to reassemble fragmented IP packets?
A. Destination address
B. IP identification
C. Don’t fragment bit
D. ToS field
2. If you were to see the following in a packet capture, what would you expect was happening?
‘ or 1=1;
A. Cross-site scripting
B. Command injection
C. SQL injection
D. XML external entity injection
3. What method might you use to successfully get malware onto a mobile device?
A. Through the Apple Store or Google Play Store
B. External storage on an Android
C. Third-party app store
D. Jailbreaking
4. What protocol is used to take a destination IP address and get a packet to a destination on
the local network?
A. DHCP
B. ARP
C. DNS
D. RARP
5. What would be the result of sending the string AAAAAAAAAAAAAAAAA into a variable
that has been allocated space for 8 bytes?
A. Heap spraying
B. SQL injection
C. Buffer overflow
D. Slowloris attack
6. If you were to see the subnet mask 255.255.248.0, what CIDR notation (prefix) would you
use to indicate the same thing?
A. /23
B. /22
C. /21
D. /20
7. What is the primary difference between a worm and a virus?
A. A worm uses polymorphic code
B. A virus uses polymorphic code
C. A worm can self-propagate
D. A virus can self-propagate
8. How would you calculate risk?
A. Probability * loss
B. Probability * mitigation factor
C. (Loss + mitigation factor) * (loss/probability)
D. Probability * mitigation factor
9. How does an evil twin attack work?
A. Phishing users for credentials
B. Spoofing an SSID
C. Changing an SSID
D. Injecting four-way handshakes
10. In order to remove malware in the network before it gets to the endpoint, you would use
which of the following?
A. Antivirus
B. Application layer gateway