01- Intro to Ethical Hacking Flashcards

1
Q

Active Directory

A

Windows based central domain controller that grants access to authorized users, storing credentials in a centralized database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Workgroup

A

Contrary to Active Directory, workgroup user maintain security principals on their own systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

LDAP

A

standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network, Lightweight Directory Access Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SIDs

A

Security Identifiers: Unique ID numbers that identify security principle objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Attack

A

occurs when a system is compromised based on a vulnerability by an unknown exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Availability

A

authorized personnel accessing the data at appointed times. Involves a comprehensive planning of hardware, software, facility, people, and connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Black hat

A

malicious hackers that try to hack systems with malicious intent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CIA Triad

A

a model promoted to define and practice policies related to information security; uses confidentiality, integrity, and availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Confidentiality

A

keeping access to the information only to the intended audience; does two things: ensures that the right people get the intended information and prevents sensitive information from reaching the wrong people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Defense

A

In-depth the use of layered security mechanisms; the layers could be data, applications, host levels, Internet networks, perimeter levels, physical securities, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ethical Hacking

A

testing the resources for a good cause and for the betterment of technology; another term for “penetration testing.”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Exploit

A

written to take advantage of a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

External Testing

A

focused on the server’s infrastructure and underlying software pertaining to the target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Gray hat

A

hackers that can aid companies in informing them about any vulnerabilities they have found, but are not hired by the companies to perform such tests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hacking

A

the skill of exploring various security breaches and posting unwanted content on websites, stealing data, etc.; concentrates on exploits and vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Human threats

A

insiders who have authorization to access systems, and hackers who use exploits to attack

17
Q

Integrity

A

maintaining the sanctity of information and keeping the data accurate throughout its life, whether it is on the same computer or shared over a network

18
Q

Malware

A

any type of program that is created with the intent to cause damage, steal data, or abuse computer system resources; includes computer viruses, worms, and Trojan horses

19
Q

Natural threats

A

can be a flood causing areas to be waterlogged, or a hurricane or a tornado causing a lot of damage.; often impact the availability of systems

20
Q

Patch

A

a fix to a vulnerability

21
Q

Penetration Testing

A

uses the same methods a hacker uses to gain unauthorized access to a network or system with a view to compromise them, but uses the methods to help companies

22
Q

Script Kiddies

A

naïve hackers try hard to get their hands on such zero day attacks, instead of writing their own

23
Q

Technology threats

A

caused by malware, zero-day attacks, exploits, or web attacks

24
Q

Vulnerability

A

a weak link in the software, settings, etc., through which, if not fixed early, someone can get access to the computer, application, and/or network and can cause damage

25
Q

White hat

A

gets permission from the data owner before any hacking and use their hacking skills for defensive purposes only. They use their knowledge and skills to locate weaknesses and implement countermeasures and for defense purposes and preventing losses.

26
Q

Zero day Attack

A

exploits that have not been published