Live Virtual Machine Lab 1-1: Introduction to Ethical Hacking
When ethically hacking a network, which of the following can be breached? (Choose all that apply).
Firewall Protocols Application Programming Interfaces (APIs) Servers Applications
If you secure information in its original form, which of the following are you protecting?
Integrity
What is the fundamental difference between hacking and ethical hacking?
Permissions to conduct the attack
Which of the following is the first step in Ethical Hacking Methodology?
Reconnaissance
Which of the following threat actor does not have the expertise of a hacker, but relies on ready-made tools as he or she cannot write their own code?
Script Kiddies