You can use this book Michael T. Simpson, Nicholas Antill, Hands-On Ethical Hack
ID: 3743248 • Letter: Y
Question
You can use this book Michael T. Simpson, Nicholas Antill, Hands-On Ethical Hacking and Network Defense, Third Edition. Chapter 1 1. Describe the role of an ethical hacker 2. Describe what you can do legally as an ethical hacker 3. Describe what you can't do as an ethical hacker Explain the differences between penetration tests and security tests. Emphasize that this book will explain things from a security testing perspective 5. Discuss the role of security and penetration testers by defining concepts such as hacker, cracker, ethical hacker, and script kiddies (i.e, packet monkeys). 6. Explain the risk of having hacking tools installed on your computer and why you should contact local law enforcement agencies before installing those tools. Technical Notes for Activities Activity 1-1: This activity requires a Web browser and an Internet connection. Activity 1-2: This activity requires a Web browser and an Internet connection. Activity 1-3: This activity requires a Web browser, an Internet connection, and any text editor Activity 1-4: This activity requires a Web browser, an Internet connection, and any text editor Activity 1-5: This activity only requires a text editor
Explanation / Answer
Ans 1) Ethical hackers are also known as white hat hackers are the individuals who break into systems legally and ethically. They penetrate a computer system or network on behalf of its owners for the purpose of finding security vulnerabilities that a malicious hacker could potentially exploit.
Ethical hacker is defined as “an individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods and techniques as a Hacker.”
Q2) What ethical hacker can do?
Ans2)
Q-3) What an ethical hacker can’t do?
Ans)
Q4)
Ans)
Security testing services: Security Testing is a variant of Software Testing which ensures, that system and applications in an organization, are free from any loopholes that may cause a big loss. Security testing of any system is about finding all possible loopholes and weaknesses of the system which might result into a loss of information at the hands of the employees or outsiders of the Organization and also how it measures with major principles of security: confidentiality, integrity, authentication, including availability, authorization and non-repudiation. Security of network is provided via architecture where baseline is established for network traffic to detect anomalous behavior. Firewalls and intrusion detection systems along with proper training of users on cyber security threats is, collectively, security.
Penetration testing services: Penetration testing is the procedure of detecting vulnerabilities in the system, software, network or web applications. Penetration testing services find vulnerabilities that an attacker could exploit. The process involves gathering information about the target before the test, identifying possible entry vulnerabilities, attempting to resolve security breaches and reporting back the findings.
Q5)
Ans)
Role of penetration tester
Role of security tester
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.