CHAPTER 10 Flashcards

(13 cards)

1
Q

…………Employed by companies to perform penetration tests

A

Ethical hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

………………Legal attempt to break into a company’s network to find
its weakest link

▪ Tester only reports findings, does not solve problems

A

Penetration test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

…………..More than an attempt to break in; also includes analyzing company’s security policy and procedures

A

Security test

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

……………………….. is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means.

A

hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why do hackers hack?

A
  • Just for fun!
  • Show off
  • Steal important information
  • Destroy other computers (such as enemy’s computers)
  • Disrupt Services
  • Money
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

T/F Independent computer security professionals breaking
into the computer system
* Neither damage the target systems nor steal
information
* Evaluate target systems security and report back to
owners about the bug found

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ethical Hackers but not Criminal Hackers

A
  • Completely trustworthy
  • Strong programming and computer networking skills
  • Learn about the system and trying to find its weakness
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Types of Hackers
Based on their motives and aims, hackers can be
categorized into three types:

A
  • White Hat Hackers
  • Black Hat Hackers
  • Gray Hat Hackers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

…………….are cyber security experts who breach
in an ‘official way.

A

White hat hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

………………..are indeed technology geniuses, but
they have the wrong motive. They target other devices to
gain access to systems to which they are not allowed

A

Black hat Hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

…………………as the name implies, is in between a white
hat and a black hat hacker

A

gray hat hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Why do we need Ethical hacking?

A

To save personal and confidential material from intruders, ethical hacking subsists.

Ethical hacking helps keep business and government
organizations out of trouble caused by hackers trying to
steal important data

It gives a great benefit if precautionary methods are taken
in advance by all the firms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What should do after hack?

A
  • Shutdown or turn off the system
  • Separate the system from network
  • Restore the system with the backup or reinstall all
    programs
  • Connect the system to the network
  • It can be good to call the police
How well did you know this?
1
Not at all
2
3
4
5
Perfectly