What kind of actions and procedures differentiates an ethical hacker from a malicious hacker?
Question 1
Below list shows the five phases of hacking in random order. Place them in the correct order into the table below:
1. Covering Tracks
2. Gaining Access
3. Maintaining Access
4. Reconnaissance
5. Scanning and Enumeration
Below list shows actions/methods/tools that are used within five hacking phases. Select three of them for each hacking phase, and fill out the table below accordingly.
1. Backdoors
2. Buffer overflow
3. Dumpster diving
4. Hide files
5. Login a wireless access point with the default password
6. Network mapper
7. Network Sniffing
8. Ping sweep
9. Port scan
10. Remove log files
11. Rootkits
12. SQL injection
13. Trojans
14. Use VPN
15. Watch the outside of the building
Describe each of the phases in one or two sentences.
| Place phases into this column in the correct order. | Action-1 | Action-2 | Action-2 | |
| Phase-1 | ||||
| Phase-2 | ||||
| Phase-3 | ||||
| Phase-4 | ||||
| Phase-5 |
Question 2
What kind of actions and procedures differentiates an ethical hacker from a malicious hacker?
