A) Unethical Hacking B) Ethical Hacking
A) Resolving security vulnerabilities B) Avoiding detections
A) Access computer system or network with authorization from owne B) Access computer system or network without authorization from owner
A) Doesn't break into systems to steal or destroy data for fun B) Break into systems to steal or destroy data for fun
A) Tester only reports findings, does not solve problems B) Tester only reports findings, and solve problems
A) Penetration tester B) Security tester
A) Collection of websites for hacking tools B) Collection of OS's and hacking tools
A) Partial information about organization is provided B) Complete information about company is provided
A) Yes B) No
A) Black box and white box B) Black box and pink box
A) Certification for ethical hacker B) Certified ethical hacker
A) SysAdmin, Audit, Network, Security B) SysAdmin, Audit, Network, Scooter
A) No B) Yes
A) some states deem it legal B) No
A) Installine worms or virus B) Installing Operating system
A) Virus, worms, trojan horses B) Insects
A) Detects and removes viruses B) Install virus in system
A) 65 B) 66
A) Denial of Service B) Denial of server
A) Prevents legitimate users from accessing network B) Prevents hackers from accessing network |