3rd Quiz Flashcards

1
Q

Hackers who use their knowledge and skills to discover and exploit security vulnerabilities for financial gain or malicious reasons are called:

A

Black hat hackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Hackers who use their knowledge and skills to improve security of a system by discovering vulnerabilities are called:

A

White hat hackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hackers who use their knowledge and skills to get something done but do not care about how it is done are called:

A

Grey hat hackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Black hat hackers who are influenced and motivated by certain religious or political beliefs are called:

A

Cyber terrorists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Activities performed by a security specialist to help companies identify vulnerabilities in their networks and systems is called:

A

Ethical hacking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ethical hackers usually use the same methods and techniques that black hat hackers do. However, the difference between them is:

A

Ethical hackers have the permission to do so, and they do not cause any damage to systems or networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When hired to evaluate the security of the client’s system/network, which of these question does an ethical hacker NOT need to ask themselves?

A

How can I use the information I find to benefit myself?

You ain’t in this game for personal gain, boy-o

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Who determines the scope of ethical hacking?

A

Client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The phase in which a hacker performs information gathering and learning about the target as much as possible is called:

A

Reconnaissance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Phase in which a hacker is able to map the routers and firewalls is called:

A

Scanning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In which phase does an attack happen?

A

Gaining access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly