PrepAway - Latest Free Exam Questions & Answers

Tag: site:www aiotestking com intitle:CEH Act

What would you infer from this alert?

Erik notices a big increase in UDP packets sent to port 1026 and 1027 occasionally. He enters the following at the command prompt. $ nc -l -p 1026 -u -v In response, he sees the following message. cell(?(c)???? STOPALERT77STOP! WINDOWS REQUIRES IMMEDIATE ATTENTION. Windows has found 47 Critical Errors. To fix the errors please do the following:
1.Download Registry Repair from: www.reg-patch.com
2.Install Registry Repair
3. Run Registry Repair
4. Reboot your computer FAILURE TO ACT NOW MAY LEAD TO DATA LOSS AND CORRUPTION!
What would you infer from this alert?

What has Samuel and his friend just performed?

Samuel is a high school teenager who lives in Modesto California. Samuel is a straight ‘A’ student who really likes tinkering around with computers and other types of electronic devices. Samuel just received a new laptop for his birthday and has been configuring it ever since. While tweaking the registry, Samuel notices a pop up at the bottom of his screen stating that his computer was now connected to a wireless network. All of a sudden, he was able to get online and surf the Internet.
Samuel did some quick research and was able to gain access to the wireless router he was connecting to and see all of its settings. Being able to hop onto someone else’s wireless network so easily fascinated Samuel, so he began doing more and more research on wireless technologies and how to exploit them. The next day, Samuel’s friend said that he could drive around all over town and pick up hundreds upon hundreds of wireless networks. This really excited Samuel so they got into his friend’s car and drove around the city seeing which networks they could connect to and which ones they could not.
What has Samuel and his friend just performed?

What is this law called?

The United Kingdom (UK) has passed a law that makes hacking into an unauthorized network a felony.
The law states:
Section 1 of the Act refers to unauthorized access to computer material. This states that a person commits an offence if he causes a computer to perform any function with intent to secure unauthorized access to any program or data held in any computer. For a successful conviction under this part of the Act, the prosecution must prove that the access secured is unauthorized and that the suspect knew that this was the case. This section is designed to deal with common-or- garden hacking.
Section 2 of the Act deals with unauthorized access with intent to commit or facilitate the commission of further offences. An offence is committed under Section 2 if a Section 1 offence has been committed and there is the intention of committing or facilitating a further offence (any offence which attracts a custodial sentence of more than five years, not necessarily one covered by the Act). Even if it is not possible to prove the intent to commit the further offence, the Section 1 offence is still committed.
Section 3 offences cover unauthorized modification of computer material, which generally means the creation and distribution of viruses. For a conviction to succeed there must have been the intent to cause the modification, and knowledge that the modification had not been authorized.
What is this law called?