Ch. 1 - Introduction to Ethical Hacking Flashcards
If you have been contracted to perform an attack against a target system, you are what type of hacker?
White hat
Which of the following describes an attacker who goes after a target to draw attention to a cause?
Hacktivist
What level of knowledge about hacking does a script kiddie have?
Low
What does an ethical hacker need to have to start evaluating a system?
Permission
How much knowledge and information does a tester have when doing a white-box test?
Complete knowledge
What is a hacker called that attacks without regard for being caught or punished?
Suicide hacker
What is a code of ethics?
A description of expected behavior
The group “Anonymous” is an example of what?
Hacktivists
What are some reasons a company may require a penetration test?
Legal, Regulatory or Auditing
What should a pentester do prior to initiating a new penetration test?
Get Permission
What does a hacktivist do?
Hack for political reasons
What does a suicide hacker do?
Hacks without stealth
Which type of hacker may use their skills for both benign and malicious goals at different times?
Gray hat
What separates a suicide hacker from other attackers?
A lack of fear about being caught
Which of the following would most likely engage in the pursuit of vulnerability research?
White
Describe what vulnerability research deals with.
Passively uncovering vulnerabilities.
How is black-box testing performed?
With no knowledge
Why is having a contract important?
It gives proof of having permissions
What does TOE stand for?
Target of Evaluation
What is a good way to describe a vulnerability?
A weakness