Intro to Ethical Hacking Chapter 2
The _____ hat hackers are Ethical Hackers who have the support of government and industry.
White Hat Hacker
The steps to take after an incident include: Identify, respond, consider possible causes, _____, and resolve and document.
Develop a Soloution
A _____is a hardware or software-based mechanism that controls in-coming and out-going traffic based on a set of rules that either permit or deny traffic on a network or host, and provide access control and active filtering.
Firewall
A _____ hacker may try to gain access to a system without permission, but in general, without malice. Often, they will notify an organization in some manner that their system was vulnerable.
Grey Hat Hacker
A(n) _____ is an unplanned occurrence that disrupts operational or day to day activities
Incident
_____ threat management devices provide firewall functions, intrusion prevention, antivirus, data loss prevention along with content filtering.
Unified A UTM system protects the network from threats while reducing complexity.