Q) What is the initial procedure should comply with the ethical hacker after brought into the organization?
a) Start testing security.
b) Turn results.
c) Enter into a formal contract with the NDA.
d) The assessment of what the organization is trying to protect.
Q) The attacker grabbed the target file, which is encrypted with the public key. Which of the following attacks is likely to be used to target file hacking?
a) timing attacks
b) Replay attack
c) memory trade-off attacks
d) Chosen plain text attack
Q) Which tool can be used to silently copy files from USB-devices?
a) USB Grabber
b) USB Guardian
c) USB Sniffer
d) USB Snoopy
Q) Analysis data hiding may be useful in
a) determining the level of encryption used to encrypt data.
b) detection and recovery of data, which may indicate knowledge of the ownership or intention.
c) determining the volume of the central processor (CPU) to use for a long time to process the data.
d) preventing denial of service attack on the set of enterprise servers, to prevent users to access the data.
Q) For messages sent through an insecure channel, properly implemented digital signature gives the receiver reason to believe that the message was sent by the claimed sender. When using a digital signature, a message digest is encrypted with any key? multiple-choice
a) the sender's public key
b) The private key of
c) the recipient the recipient's public key
d) sender's private key