Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key


Play button


Play button




Click to flip

9 Cards in this Set

  • Front
  • Back
What is an essential difference between an ethical hacker and a cracker?
The ethical hacker has authorization from the owner of the target.
What does the term ethical hacking mean?
Someone who is using his/her skills for defensive purposes.
Who is an ethical hacker?
A person who hacks for defensive purposes.
What is Hacktivism?
Hacking for a cause.
Where should a security tester be looking for information that could be used by an attacker against an organization?
Chat rooms, WHOIS databases, News groups, Web sites, Search engines, Organization's own web site.
What are the two basic types of attacks?
Passive and active attacks.
You are footprinting to gather competitive intelligence. You visit the website for contact information and telephone numbers but do not find it listed there. You know that they had the entire staff directory lised on their website 12 months ago but now its not there. How would it be possible for you to retrieve information from the website that is outdated.
Visit site to retrieve the Internet archive of the acme webite.
Which federal statutes does FBI investigate for computer crimes involving e-mail scams and mail fraud?
18 U.S.C 1030 Fraud and related activity in connection with computers
Which of the folloing activities will not be considered passive footprinting?
Scan the range of IP address found in the target DNS database.