COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
It is ok to test out ethical hacking techniques on GDMS-C networks if (hint, check IT-POL-4):
A
It is for security research
B
It is for my program
C
It is approved by Corporate Security and IT Security
D
Never
Explanation: 

Detailed explanation-1: -Penetration testing, also known as pen testing or ethical hacking: Is an advanced, offensive form of security testing designed to provide a deep technical analysis of a target environment’s vulnerability to exploitation and attack.

Detailed explanation-2: -The terms ‘penetration testing’ and ‘ethical hacking’ are often used interchangeably when referring to internal cyber security tests, but they’re not exactly the same.

Detailed explanation-3: -Ethical hackers-also called “white hats” or “red teams”-are cybersecurity experts who legally hack and test their client’s systems to identify and eliminate security problems. They always have the permission of the hacking target to hack into systems and expose vulnerabilities.

Detailed explanation-4: -A hacker can be designated unethical, illegal or even morally based solely on whether the hacker has permission to enter a system or not. Hackers who work on behalf of businesses can use their expertise and skill to find the holes that can be exploited by their malicious counterparts.

There is 1 question to complete.