Intro to Ethical Hacking Chapter 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

The _____ hat hackers are Ethical Hackers who have the support of government and industry.

White Hat Hacker

The steps to take after an incident include: Identify, respond, consider possible causes, _____, and resolve and document.

Develop a Soloution

A _____is a hardware or software-based mechanism that controls in-coming and out-going traffic based on a set of rules that either permit or deny traffic on a network or host, and provide access control and active filtering.

Firewall

A _____ hacker may try to gain access to a system without permission, but in general, without malice. Often, they will notify an organization in some manner that their system was vulnerable.

Grey Hat Hacker

A(n) _____ is an unplanned occurrence that disrupts operational or day to day activities

Incident

_____ threat management devices provide firewall functions, intrusion prevention, antivirus, data loss prevention along with content filtering.

Unified A UTM system protects the network from threats while reducing complexity.


Conjuntos de estudio relacionados

Chapter 1 Business Communication in the Digital age

View Set

Organizational Management Midterm 2 - Chapter 5

View Set

Macgruder's American Gov't: Chapter 16 Section 3: Spending and the Budget

View Set

Lecture 5 Web Hacking 1: Client bypass, Tampering, Brute Forcing

View Set

5.00 Understand Business Technology

View Set

Spanish 3 Chp. 3 Pasajes de la vida (pt. 2)

View Set

CBF Quiz Questions: Maternal Adaptation During Pregnancy

View Set

Chapter 34: The Child with Neuromuscular or Muscular Dysfunction

View Set

Accounting II Exam 3 Study Guide

View Set

MBA 6207 Study Guide - Case Study: The business of AI

View Set