Ch. 1 - Introduction to Ethical Hacking Flashcards

1
Q

If you have been contracted to perform an attack against a target system, you are what type of hacker?

A

White hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following describes an attacker who goes after a target to draw attention to a cause?

A

Hacktivist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What level of knowledge about hacking does a script kiddie have?

A

Low

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does an ethical hacker need to have to start evaluating a system?

A

Permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How much knowledge and information does a tester have when doing a white-box test?

A

Complete knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a hacker called that attacks without regard for being caught or punished?

A

Suicide hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a code of ethics?

A

A description of expected behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The group “Anonymous” is an example of what?

A

Hacktivists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some reasons a company may require a penetration test?

A

Legal, Regulatory or Auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What should a pentester do prior to initiating a new penetration test?

A

Get Permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does a hacktivist do?

A

Hack for political reasons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does a suicide hacker do?

A

Hacks without stealth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which type of hacker may use their skills for both benign and malicious goals at different times?

A

Gray hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What separates a suicide hacker from other attackers?

A

A lack of fear about being caught

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following would most likely engage in the pursuit of vulnerability research?

A

White

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Describe what vulnerability research deals with.

A

Passively uncovering vulnerabilities.

17
Q

How is black-box testing performed?

A

With no knowledge

18
Q

Why is having a contract important?

A

It gives proof of having permissions

19
Q

What does TOE stand for?

A

Target of Evaluation

20
Q

What is a good way to describe a vulnerability?

A

A weakness