Solved

Match Each Term with the Correct Statement Below

Question 10

Matching

Match each term with the correct statement below.

Premises:
someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
term used sometimes by white hats for their consulting services
handy utility for discovering information about an Internet domain
security feature used on some wireless access points
automated method for pinging a range of IP addresses
determines which TCP and UDP ports are available on a particular computer or device
allows you to capture packets and determine which protocols services are running
sometimes a derogatory term to describe an unskilled or undisciplined programmer
used to safeguard data as it travels across the Internet and even within the company network
Responses:
protocol analyzer
hacker
port scanner
MAC filtering
encryption
cracker
penetration tester
ping scanner
Whois

Correct Answer:

someone who attempts to compromise a network or computer system for the purposes of personal gain or to cause harm
term used sometimes by white hats for their consulting services
handy utility for discovering information about an Internet domain
security feature used on some wireless access points
automated method for pinging a range of IP addresses
determines which TCP and UDP ports are available on a particular computer or device
allows you to capture packets and determine which protocols services are running
sometimes a derogatory term to describe an unskilled or undisciplined programmer
used to safeguard data as it travels across the Internet and even within the company network
Related Questions