際際滷

際際滷Share a Scribd company logo
INFORMATION ASSURANCE
ANS SECURITY 2
PREFINAL EXAM
1. A person who enjoys exploring the details of
programmable systems and how to stretch their capabilities,
as opposed to most users, who prefer to learn only the
minimum necessary.
2. In what year does hack first came.
3-7. What are the 5 types of hacker.
8. What is the other term for ethical hacking.
9. It is to assess the security of a system, just as malicious
hackers might, but with explicit purpose of improving
security rather than exploiting weaknesses for nefarious
purposes.
10. What is the number 1 step to becoming a competent
ethical hacker.
11-12. What are the two (2) phases of Ethical
Hacking.
13-15. What are the three (3) types of
Penetration Testing.
16. It involves gathering or collecting of
information about the company, website, or
system that you are targeting.
17-22. Enumerate the 6 Penetration Life Cycle.
23. It is a systematic review of security
weaknesses in an information system.
24. It is a simulated cyber attack against your computer
system to check for exploitable vulnerabilities.
25. It is a dedicated operating system for cybersecurity
professionals, equipped with a comprehensive suite of tools
for penetration testing, ethical hacking and digital forensics.
26. Identifies potential weaknesses in applications and
systems.
27. Ethical Hacker specialized in network and system
security.
28. Discovers new vulnerabilities through thorough research.
29. Expert in securing web applications and understanding
web technologies.
30. Simulates adversarial tactics to test security
defense.
31. Monitors and responds to security events
32. Ethical Hacker specialized in network and system
security.
33. Analyzes and breaks down malicious software
and code.
34. Investigates and responds to computer incidents
35. Understands and Analyzes potential cyber
threats.

More Related Content

Similar to INFORMATION ASSURANCE ANS SECURITY 2.pptx (20)

BASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKINGBASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKING
Drm Kapoor
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptx
BishalRay8
Top Interview Questions for Penetration Testers.pdf
Top Interview Questions for Penetration Testers.pdfTop Interview Questions for Penetration Testers.pdf
Top Interview Questions for Penetration Testers.pdf
infosecTrain
Top Interview Questions Asked to a Penetration Tester.pdf
Top Interview Questions Asked to a Penetration Tester.pdfTop Interview Questions Asked to a Penetration Tester.pdf
Top Interview Questions Asked to a Penetration Tester.pdf
infosec train
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
amrutharam
Cyber Security vs.pdf
Cyber Security vs.pdfCyber Security vs.pdf
Cyber Security vs.pdf
Ming Man Chan
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Sanu Subham
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdfTop_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
infosec train
Top 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfTop 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdf
ShivamSharma909
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical Hacking
Jennifer Wood
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack DetectionA Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
ijsrd.com
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical ApproachIRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET Journal
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Falgun Rathod
Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdf
ShivamSharma909
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
Alan Holyoke
An Extensive Survey of Intrusion Detection Systems
An Extensive Survey of Intrusion Detection SystemsAn Extensive Survey of Intrusion Detection Systems
An Extensive Survey of Intrusion Detection Systems
IRJET Journal
M.Tech. IDS Lecture-Mid Term.pptx
M.Tech. IDS        Lecture-Mid Term.pptxM.Tech. IDS        Lecture-Mid Term.pptx
M.Tech. IDS Lecture-Mid Term.pptx
pawandeoli1
M.Tech. IDS Lecture by graphic era university
M.Tech. IDS Lecture by graphic era universityM.Tech. IDS Lecture by graphic era university
M.Tech. IDS Lecture by graphic era university
pheonix4
The 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan KochThe 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan Koch
QA or the Highway
The 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan KochThe 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan Koch
QA or the Highway
BASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKINGBASICS OF ETHICAL HACKING
BASICS OF ETHICAL HACKING
Drm Kapoor
GETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptxGETTING STARTED WITH THE ETHICAL HACKING.pptx
GETTING STARTED WITH THE ETHICAL HACKING.pptx
BishalRay8
Top Interview Questions for Penetration Testers.pdf
Top Interview Questions for Penetration Testers.pdfTop Interview Questions for Penetration Testers.pdf
Top Interview Questions for Penetration Testers.pdf
infosecTrain
Top Interview Questions Asked to a Penetration Tester.pdf
Top Interview Questions Asked to a Penetration Tester.pdfTop Interview Questions Asked to a Penetration Tester.pdf
Top Interview Questions Asked to a Penetration Tester.pdf
infosec train
Ethical hacking a licence to hack
Ethical hacking a licence to hackEthical hacking a licence to hack
Ethical hacking a licence to hack
amrutharam
Cyber Security vs.pdf
Cyber Security vs.pdfCyber Security vs.pdf
Cyber Security vs.pdf
Ming Man Chan
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Sanu Subham
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdfTop_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
infosec train
Top 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfTop 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdf
ShivamSharma909
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical Hacking
Jennifer Wood
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack DetectionA Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
A Survey: Comparative Analysis of Classifier Algorithms for DOS Attack Detection
ijsrd.com
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical ApproachIRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET- Penetration Testing using Metasploit Framework: An Ethical Approach
IRJET Journal
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun RathodVulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
Falgun Rathod
Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdf
ShivamSharma909
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
Alan Holyoke
An Extensive Survey of Intrusion Detection Systems
An Extensive Survey of Intrusion Detection SystemsAn Extensive Survey of Intrusion Detection Systems
An Extensive Survey of Intrusion Detection Systems
IRJET Journal
M.Tech. IDS Lecture-Mid Term.pptx
M.Tech. IDS        Lecture-Mid Term.pptxM.Tech. IDS        Lecture-Mid Term.pptx
M.Tech. IDS Lecture-Mid Term.pptx
pawandeoli1
M.Tech. IDS Lecture by graphic era university
M.Tech. IDS Lecture by graphic era universityM.Tech. IDS Lecture by graphic era university
M.Tech. IDS Lecture by graphic era university
pheonix4
The 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan KochThe 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan Koch
QA or the Highway
The 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan KochThe 5 Layers of Security Testing by Alan Koch
The 5 Layers of Security Testing by Alan Koch
QA or the Highway

More from DaveCalapis3 (13)

10 internet rules when using the internet.pptx
10 internet rules when using the internet.pptx10 internet rules when using the internet.pptx
10 internet rules when using the internet.pptx
DaveCalapis3
Security Information and Risk Management.pptx
Security Information and Risk Management.pptxSecurity Information and Risk Management.pptx
Security Information and Risk Management.pptx
DaveCalapis3
Team EyeBlur_PitchDeck-PSC8.pdf
Team EyeBlur_PitchDeck-PSC8.pdfTeam EyeBlur_PitchDeck-PSC8.pdf
Team EyeBlur_PitchDeck-PSC8.pdf
DaveCalapis3
[Make a Copy] Region - Team Name - Project Name.pptx
[Make a Copy] Region - Team Name - Project Name.pptx[Make a Copy] Region - Team Name - Project Name.pptx
[Make a Copy] Region - Team Name - Project Name.pptx
DaveCalapis3
GROUP1-PLANNING-PRESENTATION (1).pptx
GROUP1-PLANNING-PRESENTATION (1).pptxGROUP1-PLANNING-PRESENTATION (1).pptx
GROUP1-PLANNING-PRESENTATION (1).pptx
DaveCalapis3
CONTROLLING-PRE.1.pptx
CONTROLLING-PRE.1.pptxCONTROLLING-PRE.1.pptx
CONTROLLING-PRE.1.pptx
DaveCalapis3
COMMUNICATING.pptx
COMMUNICATING.pptxCOMMUNICATING.pptx
COMMUNICATING.pptx
DaveCalapis3
ORGANIZING-2.pptx
ORGANIZING-2.pptxORGANIZING-2.pptx
ORGANIZING-2.pptx
DaveCalapis3
EXCEL ACTIVITY.pptx
EXCEL ACTIVITY.pptxEXCEL ACTIVITY.pptx
EXCEL ACTIVITY.pptx
DaveCalapis3
EMPOWERMENT TECHNOLOGY quiz.pptx
EMPOWERMENT TECHNOLOGY quiz.pptxEMPOWERMENT TECHNOLOGY quiz.pptx
EMPOWERMENT TECHNOLOGY quiz.pptx
DaveCalapis3
ANALYSIS-AND-DESIGN-OF-ALGORITHM.ppt
ANALYSIS-AND-DESIGN-OF-ALGORITHM.pptANALYSIS-AND-DESIGN-OF-ALGORITHM.ppt
ANALYSIS-AND-DESIGN-OF-ALGORITHM.ppt
DaveCalapis3
Basic Filmmaking Concepts_0.pdf
Basic Filmmaking Concepts_0.pdfBasic Filmmaking Concepts_0.pdf
Basic Filmmaking Concepts_0.pdf
DaveCalapis3
VIRTUAL-BACKGROUND-STEPS.pptx
VIRTUAL-BACKGROUND-STEPS.pptxVIRTUAL-BACKGROUND-STEPS.pptx
VIRTUAL-BACKGROUND-STEPS.pptx
DaveCalapis3
10 internet rules when using the internet.pptx
10 internet rules when using the internet.pptx10 internet rules when using the internet.pptx
10 internet rules when using the internet.pptx
DaveCalapis3
Security Information and Risk Management.pptx
Security Information and Risk Management.pptxSecurity Information and Risk Management.pptx
Security Information and Risk Management.pptx
DaveCalapis3
Team EyeBlur_PitchDeck-PSC8.pdf
Team EyeBlur_PitchDeck-PSC8.pdfTeam EyeBlur_PitchDeck-PSC8.pdf
Team EyeBlur_PitchDeck-PSC8.pdf
DaveCalapis3
[Make a Copy] Region - Team Name - Project Name.pptx
[Make a Copy] Region - Team Name - Project Name.pptx[Make a Copy] Region - Team Name - Project Name.pptx
[Make a Copy] Region - Team Name - Project Name.pptx
DaveCalapis3
GROUP1-PLANNING-PRESENTATION (1).pptx
GROUP1-PLANNING-PRESENTATION (1).pptxGROUP1-PLANNING-PRESENTATION (1).pptx
GROUP1-PLANNING-PRESENTATION (1).pptx
DaveCalapis3
CONTROLLING-PRE.1.pptx
CONTROLLING-PRE.1.pptxCONTROLLING-PRE.1.pptx
CONTROLLING-PRE.1.pptx
DaveCalapis3
COMMUNICATING.pptx
COMMUNICATING.pptxCOMMUNICATING.pptx
COMMUNICATING.pptx
DaveCalapis3
ORGANIZING-2.pptx
ORGANIZING-2.pptxORGANIZING-2.pptx
ORGANIZING-2.pptx
DaveCalapis3
EXCEL ACTIVITY.pptx
EXCEL ACTIVITY.pptxEXCEL ACTIVITY.pptx
EXCEL ACTIVITY.pptx
DaveCalapis3
EMPOWERMENT TECHNOLOGY quiz.pptx
EMPOWERMENT TECHNOLOGY quiz.pptxEMPOWERMENT TECHNOLOGY quiz.pptx
EMPOWERMENT TECHNOLOGY quiz.pptx
DaveCalapis3
ANALYSIS-AND-DESIGN-OF-ALGORITHM.ppt
ANALYSIS-AND-DESIGN-OF-ALGORITHM.pptANALYSIS-AND-DESIGN-OF-ALGORITHM.ppt
ANALYSIS-AND-DESIGN-OF-ALGORITHM.ppt
DaveCalapis3
Basic Filmmaking Concepts_0.pdf
Basic Filmmaking Concepts_0.pdfBasic Filmmaking Concepts_0.pdf
Basic Filmmaking Concepts_0.pdf
DaveCalapis3
VIRTUAL-BACKGROUND-STEPS.pptx
VIRTUAL-BACKGROUND-STEPS.pptxVIRTUAL-BACKGROUND-STEPS.pptx
VIRTUAL-BACKGROUND-STEPS.pptx
DaveCalapis3

Recently uploaded (20)

Kaun TALHA quiz Prelims - El Dorado 2025
Kaun TALHA quiz Prelims - El Dorado 2025Kaun TALHA quiz Prelims - El Dorado 2025
Kaun TALHA quiz Prelims - El Dorado 2025
Conquiztadors- the Quiz Society of Sri Venkateswara College
Storytelling instructions...............
Storytelling instructions...............Storytelling instructions...............
Storytelling instructions...............
Alexander Benito
N.C. DPI's 2023 Language Diversity Briefing
N.C. DPI's 2023 Language Diversity BriefingN.C. DPI's 2023 Language Diversity Briefing
N.C. DPI's 2023 Language Diversity Briefing
Mebane Rash
English 4 Quarter 4 Week 4 Classroom Obs
English 4 Quarter 4 Week 4 Classroom ObsEnglish 4 Quarter 4 Week 4 Classroom Obs
English 4 Quarter 4 Week 4 Classroom Obs
NerissaMendez1
Essentials of a Good PMO, presented by Aalok Sonawala
Essentials of a Good PMO, presented by Aalok SonawalaEssentials of a Good PMO, presented by Aalok Sonawala
Essentials of a Good PMO, presented by Aalok Sonawala
Association for Project Management
Computer Network Unit IV - Lecture Notes - Network Layer
Computer Network Unit IV - Lecture Notes - Network LayerComputer Network Unit IV - Lecture Notes - Network Layer
Computer Network Unit IV - Lecture Notes - Network Layer
Murugan146644
Principle and Practices of Animal Breeding || Boby Basnet
Principle and Practices of Animal Breeding || Boby BasnetPrinciple and Practices of Animal Breeding || Boby Basnet
Principle and Practices of Animal Breeding || Boby Basnet
Boby Basnet
A PPT Presentation on The Princess and the God: A tale of ancient India by A...
A PPT Presentation on The Princess and the God: A tale of ancient India  by A...A PPT Presentation on The Princess and the God: A tale of ancient India  by A...
A PPT Presentation on The Princess and the God: A tale of ancient India by A...
Beena E S
Rass MELAI : an Internet MELA Quiz Finals - El Dorado 2025
Rass MELAI : an Internet MELA Quiz Finals - El Dorado 2025Rass MELAI : an Internet MELA Quiz Finals - El Dorado 2025
Rass MELAI : an Internet MELA Quiz Finals - El Dorado 2025
Conquiztadors- the Quiz Society of Sri Venkateswara College
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
The Story Behind the Abney Park Restoration Project by Tom Walker
The Story Behind the Abney Park Restoration Project by Tom WalkerThe Story Behind the Abney Park Restoration Project by Tom Walker
The Story Behind the Abney Park Restoration Project by Tom Walker
History of Stoke Newington
Year 10 The Senior Phase Session 3 Term 1.pptx
Year 10 The Senior Phase Session 3 Term 1.pptxYear 10 The Senior Phase Session 3 Term 1.pptx
Year 10 The Senior Phase Session 3 Term 1.pptx
mansk2
Eng7-Q4-Lesson 1 Part 1 Understanding Discipline-Specific Words, Voice, and T...
Eng7-Q4-Lesson 1 Part 1 Understanding Discipline-Specific Words, Voice, and T...Eng7-Q4-Lesson 1 Part 1 Understanding Discipline-Specific Words, Voice, and T...
Eng7-Q4-Lesson 1 Part 1 Understanding Discipline-Specific Words, Voice, and T...
sandynavergas1
The Constitution, Government and Law making bodies .
The Constitution, Government and Law making bodies .The Constitution, Government and Law making bodies .
The Constitution, Government and Law making bodies .
saanidhyapatel09
PUBH1000 Module 3: Public Health Systems
PUBH1000 Module 3: Public Health SystemsPUBH1000 Module 3: Public Health Systems
PUBH1000 Module 3: Public Health Systems
Jonathan Hallett
How to use Init Hooks in Odoo 18 - Odoo 際際滷s
How to use Init Hooks in Odoo 18 - Odoo 際際滷sHow to use Init Hooks in Odoo 18 - Odoo 際際滷s
How to use Init Hooks in Odoo 18 - Odoo 際際滷s
Celine George
TPR Data strategy 2025 (1).pdf Data strategy
TPR Data strategy 2025 (1).pdf Data strategyTPR Data strategy 2025 (1).pdf Data strategy
TPR Data strategy 2025 (1).pdf Data strategy
Henry Tapper
Blind Spots in AI and Formulation Science Knowledge Pyramid (Updated Perspect...
Blind Spots in AI and Formulation Science Knowledge Pyramid (Updated Perspect...Blind Spots in AI and Formulation Science Knowledge Pyramid (Updated Perspect...
Blind Spots in AI and Formulation Science Knowledge Pyramid (Updated Perspect...
Ajaz Hussain
How to Configure Restaurants in Odoo 17 Point of Sale
How to Configure Restaurants in Odoo 17 Point of SaleHow to Configure Restaurants in Odoo 17 Point of Sale
How to Configure Restaurants in Odoo 17 Point of Sale
Celine George
TLE 7 - 2nd Topic - Codes and Standards in Industrial Arts Services.pptx
TLE 7 - 2nd Topic - Codes and Standards in Industrial Arts Services.pptxTLE 7 - 2nd Topic - Codes and Standards in Industrial Arts Services.pptx
TLE 7 - 2nd Topic - Codes and Standards in Industrial Arts Services.pptx
RizaBedayo
Storytelling instructions...............
Storytelling instructions...............Storytelling instructions...............
Storytelling instructions...............
Alexander Benito
N.C. DPI's 2023 Language Diversity Briefing
N.C. DPI's 2023 Language Diversity BriefingN.C. DPI's 2023 Language Diversity Briefing
N.C. DPI's 2023 Language Diversity Briefing
Mebane Rash
English 4 Quarter 4 Week 4 Classroom Obs
English 4 Quarter 4 Week 4 Classroom ObsEnglish 4 Quarter 4 Week 4 Classroom Obs
English 4 Quarter 4 Week 4 Classroom Obs
NerissaMendez1
Computer Network Unit IV - Lecture Notes - Network Layer
Computer Network Unit IV - Lecture Notes - Network LayerComputer Network Unit IV - Lecture Notes - Network Layer
Computer Network Unit IV - Lecture Notes - Network Layer
Murugan146644
Principle and Practices of Animal Breeding || Boby Basnet
Principle and Practices of Animal Breeding || Boby BasnetPrinciple and Practices of Animal Breeding || Boby Basnet
Principle and Practices of Animal Breeding || Boby Basnet
Boby Basnet
A PPT Presentation on The Princess and the God: A tale of ancient India by A...
A PPT Presentation on The Princess and the God: A tale of ancient India  by A...A PPT Presentation on The Princess and the God: A tale of ancient India  by A...
A PPT Presentation on The Princess and the God: A tale of ancient India by A...
Beena E S
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
The Story Behind the Abney Park Restoration Project by Tom Walker
The Story Behind the Abney Park Restoration Project by Tom WalkerThe Story Behind the Abney Park Restoration Project by Tom Walker
The Story Behind the Abney Park Restoration Project by Tom Walker
History of Stoke Newington
Year 10 The Senior Phase Session 3 Term 1.pptx
Year 10 The Senior Phase Session 3 Term 1.pptxYear 10 The Senior Phase Session 3 Term 1.pptx
Year 10 The Senior Phase Session 3 Term 1.pptx
mansk2
Eng7-Q4-Lesson 1 Part 1 Understanding Discipline-Specific Words, Voice, and T...
Eng7-Q4-Lesson 1 Part 1 Understanding Discipline-Specific Words, Voice, and T...Eng7-Q4-Lesson 1 Part 1 Understanding Discipline-Specific Words, Voice, and T...
Eng7-Q4-Lesson 1 Part 1 Understanding Discipline-Specific Words, Voice, and T...
sandynavergas1
The Constitution, Government and Law making bodies .
The Constitution, Government and Law making bodies .The Constitution, Government and Law making bodies .
The Constitution, Government and Law making bodies .
saanidhyapatel09
PUBH1000 Module 3: Public Health Systems
PUBH1000 Module 3: Public Health SystemsPUBH1000 Module 3: Public Health Systems
PUBH1000 Module 3: Public Health Systems
Jonathan Hallett
How to use Init Hooks in Odoo 18 - Odoo 際際滷s
How to use Init Hooks in Odoo 18 - Odoo 際際滷sHow to use Init Hooks in Odoo 18 - Odoo 際際滷s
How to use Init Hooks in Odoo 18 - Odoo 際際滷s
Celine George
TPR Data strategy 2025 (1).pdf Data strategy
TPR Data strategy 2025 (1).pdf Data strategyTPR Data strategy 2025 (1).pdf Data strategy
TPR Data strategy 2025 (1).pdf Data strategy
Henry Tapper
Blind Spots in AI and Formulation Science Knowledge Pyramid (Updated Perspect...
Blind Spots in AI and Formulation Science Knowledge Pyramid (Updated Perspect...Blind Spots in AI and Formulation Science Knowledge Pyramid (Updated Perspect...
Blind Spots in AI and Formulation Science Knowledge Pyramid (Updated Perspect...
Ajaz Hussain
How to Configure Restaurants in Odoo 17 Point of Sale
How to Configure Restaurants in Odoo 17 Point of SaleHow to Configure Restaurants in Odoo 17 Point of Sale
How to Configure Restaurants in Odoo 17 Point of Sale
Celine George
TLE 7 - 2nd Topic - Codes and Standards in Industrial Arts Services.pptx
TLE 7 - 2nd Topic - Codes and Standards in Industrial Arts Services.pptxTLE 7 - 2nd Topic - Codes and Standards in Industrial Arts Services.pptx
TLE 7 - 2nd Topic - Codes and Standards in Industrial Arts Services.pptx
RizaBedayo

INFORMATION ASSURANCE ANS SECURITY 2.pptx

  • 2. 1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. 2. In what year does hack first came. 3-7. What are the 5 types of hacker. 8. What is the other term for ethical hacking. 9. It is to assess the security of a system, just as malicious hackers might, but with explicit purpose of improving security rather than exploiting weaknesses for nefarious purposes. 10. What is the number 1 step to becoming a competent ethical hacker.
  • 3. 11-12. What are the two (2) phases of Ethical Hacking. 13-15. What are the three (3) types of Penetration Testing. 16. It involves gathering or collecting of information about the company, website, or system that you are targeting. 17-22. Enumerate the 6 Penetration Life Cycle. 23. It is a systematic review of security weaknesses in an information system.
  • 4. 24. It is a simulated cyber attack against your computer system to check for exploitable vulnerabilities. 25. It is a dedicated operating system for cybersecurity professionals, equipped with a comprehensive suite of tools for penetration testing, ethical hacking and digital forensics. 26. Identifies potential weaknesses in applications and systems. 27. Ethical Hacker specialized in network and system security. 28. Discovers new vulnerabilities through thorough research. 29. Expert in securing web applications and understanding web technologies.
  • 5. 30. Simulates adversarial tactics to test security defense. 31. Monitors and responds to security events 32. Ethical Hacker specialized in network and system security. 33. Analyzes and breaks down malicious software and code. 34. Investigates and responds to computer incidents 35. Understands and Analyzes potential cyber threats.