Study sets, textbooks, questions
Upgrade to remove ads
Terms in this set (12)
What is the main federal statue that addresses computer hacking under U.S federal law?
Which of the following addresses the secrecy and privacy of information?
Hacker attacks, unauthorized access, and viruses and malware can all be described as what?
Who are the individuals who perform legal security tests while sometimes performing questionable activities?
-White Hat Hackers
-Gray Hat Hackers
Gray Hat Hackers
Which of the following is the most important step for the ethical hacker to perform during the pre-assessment?
-Obtain written permission to hack
-Obtain permission to hack
-Gather information about the target
-Hack the web server
Obtain written permission to hack
Which of the following is one primary difference between a malicious hacker and an ethical hacker?
-Malicious hackers are more advanced than ethical hackers because they can use any technique to attack a system or network
-Malicious hackers use different tools and techniques than ethical hackers do
-Ethical Hackers use the same methods but strive to do no harm
-Ethical hackers obtain permission before bringing down servers or stealing credit card databases
Ethical hackers obtain permission before bringing down servers or stealing credit card databases
This type of security test might seek to target the CEO's laptop or the organization's backup tapes to extract critical information, usernames, and passwords.
Which of the following best describes an attack that altered the contents of two critical files?
Which individuals believe that hacking and defacing websites can promote social change?
-Black Hat Hackers
-Grey Hack Hackers
In 2000, Mafiaboy launched an attack that knocked out the availability of eBay and Yahoo! for several hours. This attack targeted which of the following?
This type of security test usually takes on an adversarial role and looks to see what an outsider can access and control.
How many components are in a security evaluation?
Other sets by this creator
Snort False Positive and Negative
Intro to Snort
Quiz 3 (Snort)
Other Quizlet sets
Cybersecurity Essentials Final
Ch 9 - AIS
INFORMATION TECHNOLOGY POLICY