AM
ETHICAL HACKER PRO - CHAPTER 2 WITH QUESTIONS AND ANSWERS
Ethical hacking Perpetrating exploits against a system with the intent to
find vulnerabilities so
that security weaknesses can be addressed and the
system can be made more secure.
Penetration testing The practice of finding vulnerabilities and risks with
the purpose of securing the computer or network
system.
Red team An offensive security team that attempts to discover
vulnerabilities in a network or computer system.
https://quizlet.com/732371666/testout-ethical-hacker-pro-chapter-2- 1/
flash-cards/ 8
, 3/2/26, 11:34
AM
Blue team A defensive security team that attempts to close
vulnerabilities and stop the red team.
Purple team A mixture of both red and blue teams.
Performing reconnaissance In this phase, the hacker begins gathering
information about the target. This can include
gathering publicly available information, using
social engineering techniques, or even dumpster
diving.
Scanning and enumeration Scanning is a natural extension of reconnaissance.
The hacker uses various
tools to gather in-depth information about the
network, computer systems, live systems, open
ports, and other features. Extracting information
such as usernames, computer names, network
resources, shares, and services is known as
enumeration. Enumeration is a part of the scanning
step.
Establishing access In this phase, the hacker uses all the information
gathered through reconnaissance and scanning
to exploit any vulnerabilities found and gain
access.
Maintaining access Once the hacker has gained access, he can use
backdoors, rootkits, or Trojans to establish
permanent access to the system.
https://quizlet.com/732371666/testout-ethical-hacker-pro-chapter-2- 2/
flash-cards/ 8