A hacker is a type of hands-on, experimenting scientist, although perhaps sometimes the term “mad scientist” fits better since unlike professional scientists, they dive right in following a feeling rather than a formal hypothesis.
A person that goes into people accounts and deletes their account.
Someone who shoulder-surfs passwords and logs into someones account.
End User License _______________
Whats does OSSTMM, stand for?
Onama Serious Single Manned Matrix
Open Source Security Testing Methodology Manual
Online State Services To Make Minexes
When hacking is done from a foreign business against another business in a different country to get an edge in business it's called ________________ ________________
What is Espionage?
What is put in salads
Used by hackers to steal private information
Used by government to stop hackers
When hacking is used against a foreign government to commit criminal acts of breaking and entering, trespassing, theft, and destruction to get the edge in political or military information
When hacking is used to get private and personal information on individual people to embarrass them publicly is called _______________
If public information is dug out to target a person or company for an attack, but no criminal acts are made to get the information, it's referred to as document grinding or _________
When hacking is used to understand a company network, systems, applications, and devices as the target of an attack without actually intruding or trespassing into the systems it's known as ____________ _______________
When hacking is used to deeply understand a competitor without breaking any laws it's called ____________ ______________
When a security product should be shrinking it, its called ____________
Outlines four ways these interactions are used to analyze something as deeply as possible, is called?
A word we use to describe the total possible operating environment, is called?
Whats the code for Physical Security?
What is the code for Spectrum Security?
Whats the code for Communications Security?
Anything that has value to the owner, is called?
The things beyond the asset owner’s ability to provide independently, is called?
What is the goal for security?
What are ways we can create a separation?
Destroy the Hacker.
Destroy the asset.
Destroy the threat
Move the asset to create a barrier between it and the threats.
Change the threat to a harmful
Change the threat to a harmless state
Destroying the Asset is recommended.
True
False
{"name":"Lesson 1: Being A Hacker", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"What is a hacker?, End User License _______________, Whats does OSSTMM, stand for?","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}