CSF 6.5 Assessment Review - Ethical Hacking

CSF 6.5 Assessment Review - Ethical Hacking

Assessment

Flashcard

Computers

9th - 12th Grade

Hard

Created by

Quizizz Content

FREE Resource

Student preview

quiz-placeholder

8 questions

Show all answers

1.

FLASHCARD QUESTION

Front

Which image best portrays your current mood?

Back

undefined

2.

FLASHCARD QUESTION

Front

A person uses a computer to steal enough money so that they and their family will never have to work again. Which of the following best describes this action?

Back

unethical & illegal

Answer explanation

The action described is both unethical and illegal. It is unethical because stealing is generally considered to be wrong and goes against commonly accepted moral values. It is also illegal because stealing is a crime and punishable by law. Regardless of the intentions or motivations behind the act, stealing is not a justifiable or acceptable means of achieving financial security.

3.

FLASHCARD QUESTION

Front

Another name for an ethical hacker is?

Back

White-hat hacker

Answer explanation

Another name for an ethical hacker is a White-hat hacker. White-hat hackers are computer security experts who use their knowledge and skills to test and improve the security of computer systems, networks, and applications. They typically work for companies or organizations to identify and fix vulnerabilities in their systems before they can be exploited by malicious attackers. Unlike black-hat hackers who engage in illegal activities such as stealing or destroying data, white-hat hackers operate within the law and follow ethical guidelines to ensure that their actions do not cause harm to others.

4.

FLASHCARD QUESTION

Front

An ethical hacker agreement is an agreement that does what?

Back

forbids you to disclose or share any information that you acquire while learning about cybersecurity or working in cybersecurity for an organization.

Answer explanation

An ethical hacker agreement is an agreement that allows you to perform specific types of hacking activities while working for an organization, typically for the purpose of identifying and addressing security vulnerabilities. This agreement typically outlines the scope of your work as a hacker, the methods and tools you are permitted to use, and any limitations on your actions. The agreement may also include provisions related to confidentiality and data protection. It is important to note that ethical hacking is generally performed with the explicit consent and knowledge of the organization being tested.

5.

FLASHCARD QUESTION

Front

The biggest difference between a white-hat hacker and a black-hat hacker is?

Back

A white-hat hacker hacks with good intent, while a black-hat hacker hacks with ill intent.

Answer explanation

The biggest difference between a white-hat hacker and a black-hat hacker is that a white-hat hacker hacks with good intent, while a black-hat hacker hacks with ill intent. White-hat hackers are also known as ethical hackers, and they typically use their skills to identify and fix security vulnerabilities in systems and networks. Black-hat hackers, on the other hand, use their skills to gain unauthorized access to systems and networks for personal gain, such as stealing sensitive data or causing damage to the system. While some black-hat hackers may claim to be bound by ethics, their actions are generally considered illegal and unethical.

6.

FLASHCARD QUESTION

Front

Which of these is a phase of hacking? Denying Access, Donating Access, Losing Access, Gaining Access

Back

Gaining Access

Answer explanation

The 5 phases of hacking are:

Reconnaissance

Scanning

Gaining access

Maintaining access

Covering tracks

7.

FLASHCARD QUESTION

Front

Which of the following is not a task completed by an ethical hacker?
Obtains written permission from the owner of the system or network before performing any testing.
Reports all identified vulnerabilities to the owner of the system or network.
Keeps all information obtained during testing confidential and secure.

Back

Uses the same techniques and methods as black-hat hackers.

8.

FLASHCARD QUESTION

Front

How confident do you feel about this topic?

Back

Very confident, Mostly confident, Somewhat confident, Not confident at all