Match each item with a statement below.

A. Inexperienced people who copy code or use tools created by knowledgeable programmers
B. A group of people with varied skills who perform penetration tests
C. A test that does not divulge to staff that penetration testing is being conducted or disclose what technologies the company is using to the security professional
D. A person who breaks into systems to steal or destroy data
E. An attempt to identify all the unprotected areas found in an application or on a system
F. Analysis of a company's security policy and procedures followed with a report disclosing any vulnerabilities to management
G. An individual who breaks into a computer system illegally
H. Hybrid of the white and black box models used for penetration testing
I. An individual who breaks into a company's computer system legally when employed or contracted by that company
J. An ethical attempt to break into a company's network or applications to find weak links


A. script kiddies
B. red team
C. black box model
D. crackers
E. vulnerability assessment
F. security test
G. hacker
H. gray box model
I. ethical hacker
J. penetration test

Computer Science & Information Technology

You might also like to view...

You suspect that there are a number of deleted files that can still be salvaged in the unallocated space of a drive image. During which phase of the investigation would you use a data carving utility?

a. Examination b. Acquisition c. Identification/Assessment d. Analysis e. Reporting

Computer Science & Information Technology

Query strings permanently maintain state information.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Which of the following statements is true regarding the Outline view?

What will be an ideal response?

Computer Science & Information Technology

Examples of browser plug-ins

What will be an ideal response?

Computer Science & Information Technology