AM
TEST OUT ETHICAL HACKER PRO VOCABULARY WITH THE CORRECT ANSWERS
2026/2027.
Ethical hacking Perpetrating exploits against a system with the intent
to find vulnerabilities so
that security weaknesses can be addressed and the
system can be made more secure.
Penetration testing The practice of finding vulnerabilities and risks with
the purpose of securing the computer or network
system.
Red team An offensive security team that attempts to discover
vulnerabilities in a network or computer system.
Blue team A defensive security team that attempts to close
vulnerabilities and stop the red team.
Purple team A mixture of both red and blue teams.
Performing reconnaissance In this phase, the hacker begins gathering information
about the target. This can include gathering publicly
available information, using social engineering
techniques, or even dumpster diving.
Scanning and enumeration Scanning is a natural extension of reconnaissance.
The hacker uses various
tools to gather in-depth information about the
network, computer systems, live systems, open
ports, and other features. Extracting information
such as usernames, computer names, network
https://quizlet.com/547653389/testout-ethical-hacker-pro-vocabulary- 1/
flash-cards/ 8
, 3/2/26, 11:34
AM
resources, shares, and services is known as
enumeration. Enumeration is a part of the scanning
step.
Establishing access In this phase, the hacker uses all the information
gathered through reconnaissance and scanning to
exploit any vulnerabilities found and gain access.
Maintaining access Once the hacker has gained access, he can use
backdoors, rootkits, or Trojans to establish
permanent access to the system.
Clearing tracks The final step in the hacking process is clearing
tracks. The hacker overwrites log files to hide the
fact they were ever there.
Black box The ethical hacker has no information regarding
the target or network. This type of test best
simulates an outside attack and ignores the
insider threats.
White box The ethical hacker is given full knowledge of the
target or network. This test allows for a
comprehensive and thorough test, but is not
very realistic.
Gray box The ethical hacker is given partial information of the
target or network, such as IP configurations or
emails lists. This test simulates an insider threat.
Advanced persistent threat (APT) A stealthy computer network attack in which a
person or group gains unauthorized access to a
https://quizlet.com/547653389/testout-ethical-hacker-pro-vocabulary- 2/
flash-cards/ 8