An Ethical Hacker is known as what type of "hat."
White Hat
Operations that target or exploit information media in order to win some objective over an adversary.
Information Warfare
Term that refers to pre-attack phase where hackers collect information.
Footprinting or Reconnaissance
What year did the military realize that IT was critical to contemporary warfare?
1990s
Type of testing that gives the ethical hacker full knowledge of the IT infrastructure
White Box testing
What three elements affect computers and cybersecurity
Confidentiality, Integrity, Accessibility
Refers to a previously known security vulnerability that is exploited before the vendor can release a patch.
Zero-day exploit
What are the three parts of Computer Security
Data Security, System Security, Network Security
Responsible Disclosure
What is the difference between a virus and a worm?
A virus is a self-replicating program that attaches itself to other code, while a worm is a stand along program that targets network resources.