I Hate CBT's

View Original

How Can Taskmgr Be Used To Identify Malware

Question: Ethical Hackers

Answer: Users who attempt to break into a computer system or network with the owner’s permission.

Question: Security Test

Answer: A test done by security professionals that goes beyond attempting to break into a network; it’s carried out to analyze security policies and procedures and report vulnerabilities to management

Question: Penetration Test

Answer: A test done by security professionals to break into a network (with permission from the owner) in an effort to discover vulnerabilities; penetration testers are also called “ethical hackers”

Question: Hacker

Answer: A user who attempts to break into a computer system or network without authorization from the owner.

Question: Vulnerability Assessment

Answer: A test performed by security professionals to enumerate as many vulnerabilities as possible

Question: Packet Monkeys

Answer: A derogatory term for unskilled crackers or hackers who steal program code and use it to hack into network systems instead of creating the programs themselves

Question: Crackers

Answer: Hackers who break into systems with the intent of doing harm or destroying data

Question: Script Kiddies

Answer: Similar to packet monkeys, a term for unskilled hackers or crackers who use scripts or programs written by others to penetrate networks.

Question: Hacktivist

Answer: A hacker who breaks into a computer system or network for political or ideological reasons

Question: White Box Model

Answer: A model for penetration testing in which testers can speak with company staff and are given a full description of the network topology and technology.