A) Unethical Hacking B) Ethical Hacking
A) Avoiding detections B) Resolving security vulnerabilities
A) Access computer system or network without authorization from owner B) Access computer system or network with authorization from owne
A) Doesn't break into systems to steal or destroy data for fun B) Break into systems to steal or destroy data for fun
A) Tester only reports findings, does not solve problems B) Tester only reports findings, and solve problems
A) Security tester B) Penetration tester
A) Collection of OS's and hacking tools B) Collection of websites for hacking tools
A) Partial information about organization is provided B) Complete information about company is provided
A) Yes B) No
A) Black box and pink box B) Black box and white box
A) Certification for ethical hacker B) Certified ethical hacker
A) SysAdmin, Audit, Network, Security B) SysAdmin, Audit, Network, Scooter
A) Yes B) No
A) some states deem it legal B) No
A) Installing Operating system B) Installine worms or virus
A) Virus, worms, trojan horses B) Insects
A) Install virus in system B) Detects and removes viruses
A) 66 B) 65
A) Denial of server B) Denial of Service
A) Prevents hackers from accessing network B) Prevents legitimate users from accessing network |