You are on page 1of 2

Ethical Hacking (REVIEW QUESTIONS)

1. A penetration tester should possess which of the following attributes?


(Choose all that apply.)
a. Good listening skills
b. Knowledge of networking and computer technology
c. Good verbal and written communication skills
d. An interest in securing networks and computer systems

2. What three models do penetration or security testers use to conduct tests


(covered last week)?

3. List the three components of the TCP/IP three-way handshake.

4. List the six flags of a TCP packet.

5. What is the main purpose of malware?

6. List three types of malware.

7. To reduce the risk of a virus attack on a network, you should do which of the
following?

a. Use antivirus software.


b. Educate users about opening attachments from suspicious e-mail
c. Keep virus signatures files current.
d. All of the above

You might also like