3rd Quiz Flashcards
Hackers who use their knowledge and skills to discover and exploit security vulnerabilities for financial gain or malicious reasons are called:
Black hat hackers.
Hackers who use their knowledge and skills to improve security of a system by discovering vulnerabilities are called:
White hat hackers.
Hackers who use their knowledge and skills to get something done but do not care about how it is done are called:
Grey hat hackers.
Black hat hackers who are influenced and motivated by certain religious or political beliefs are called:
Cyber terrorists.
Activities performed by a security specialist to help companies identify vulnerabilities in their networks and systems is called:
Ethical hacking.
Ethical hackers usually use the same methods and techniques that black hat hackers do. However, the difference between them is:
Ethical hackers have the permission to do so, and they do not cause any damage to systems or networks.
When hired to evaluate the security of the client’s system/network, which of these question does an ethical hacker NOT need to ask themselves?
How can I use the information I find to benefit myself?
You ain’t in this game for personal gain, boy-o
Who determines the scope of ethical hacking?
Client.
The phase in which a hacker performs information gathering and learning about the target as much as possible is called:
Reconnaissance.
Phase in which a hacker is able to map the routers and firewalls is called:
Scanning.
In which phase does an attack happen?
Gaining access.