Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Ethical Hacking
Quiz 1: Ethical Hacking Overview
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
Multiple Choice
What name is given to people who break into computer systems with the sole purpose to steal or destroy data?
Question 22
Essay
Why is it a challenge and concern for an ethical hacker to avoid breaking any laws?
Question 23
Essay
In the context of penetration testing,what is the gray box model?
Question 24
Multiple Choice
What organization disseminates research documents on computer and network security worldwide at no cost?
Question 25
Multiple Choice
What common term is used by security testing professionals to describe vulnerabilities in a network?
Question 26
Essay
What is the SANS Institutes "Top 25 Software Errors" list?
Question 27
Essay
What are four different skills a security tester needs to be successful?
Question 28
Multiple Choice
If you work for a company as a security professional,you will most likely be placed on a special team that will conduct penetration tests.What is the standard name for a team made up of security professionals?
Question 29
Multiple Choice
What type of assessment performed by a penetration tester attempts to identify all the weaknesses found in an application or on a system?
Question 30
Multiple Choice
What professional security certification requires applicants to demonstrate hands-on abilities to earn their certificate?
Question 31
Multiple Choice
Penetration testing can create ethical,technical,and privacy concerns for a company's management team.What can a security consultant do to ensure the client fully understands the scope of testing that will be performed?