Network Security Threats - Match-up

Match-up definitions and answers with key terms and examples. Press submit to check your answers.

Ethical Hacking
Penetration Testing
Grey Hat Hacker
White Hat Hacker
Black Hat Hacker
Bug Bounties
Vulnerabilities
Unauthorized Access


Answers
The act of gaining access to a computer system or network without permission, typically for malicious purposes
Financial rewards offered by companies for finding system vulnerabilities
Testing a system's security features by attempting to break into it, without malicious intent
Ethical hacking to find and report security weaknesses
Hackers who break into systems for unethical or illegal activities
Hackers who discover vulnerabilities without exploiting them for personal gain
Hackers employed to test security systems and report vulnerabilities
Flaws or weaknesses in a system that can be exploited by cyber attacks
Log in or sign-up to access the match-up activity



Don't have a login?

You can still revise this topic