Ethical Hacking 1 Quiz Flashcards
What term is also used to describe an ethical hacker, which is a security professional who employs their hacking skills for defensive purposes?
White hat
Which attack approach to ethical hacking deals with the ethical hacker trying to extract the data from devices, such as laptop computers and PDAs?
Stolen equipment attack
In the conclusion phase of an ethical hacking assignment, which of the following procedures should be followed?
Data that is kept for long term clients must be encrypted and stored offline.
Which of the following is NOT a definition of a vulnerability?
An action or event that might compromise security
{right definitions}
A security weakness in a target of evaluation. The presence of a weakness, design error, or implementation error. Weakness in an information system or components.
Which category of ethical hacker should inadvertently put their client at risk from future attacks?
Former black hats
Which term refers to a breach in security?
exposure
Which term means that the owner of a system should have confidence that the system will behave according to its specifications?
Assurance
When conducting an ethical hacking assignment, which step is very important to conduct, as it protects the ethical hacker from prosecution?
Prepare NDA documents.
Which phases of an attack is when the attacker begins to actively probe the target for vulnerabilities that can be exploited?
Scanning
The information resource or asset that is being protected from attacks is usually referred to as what?
The target of evaluation