#32 Flashcards

1
Q

Hackers who hunt for bugs and try to close security holes in software to make systems safer and more resilient. They are often hired by companies and governments to perform security evaluations

A

White Hats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Malicious hackers with intentions to steal, exploit and sell computer vulnerabilities and data

A

Black Hats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Some hack for amusement and curiosity while cybercriminals hack most often for what?

A

Monetary gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Who use their skills to promote a social or political goal?

A

Hacktivists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The most common way that hackers get into computer systems is not by hacking its by tricking users to let them in. This is called what? This is where a person is manipulated into divulging confidential information or configuring a computer system so that it permits entry by attackers.

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The most common type of attack.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You encounter most often as an email asking you to login to an account on a website. This is an example of what?

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Where attackers call up a company and then confidential pretend to be from their IT department. This is an example of what?

A

Pre-texting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Emails ar a sommen delivery mechanism for what?

A

Trojan horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are programs that masquerade as harmless attachments, like a photo or invoice, but actually contain malicious software, called malware ?

A

Trojan horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Demand a ransom

A

Ransomeware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

If you have physical access to a computer you can attach wires to the device’s memory chip and make a perfect copy of its contents. With this set up you can try a series of passwords, until the device stats making you wait.

A

NAND Mirroring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Successfully utilizing a bug to gain capabilities or access

A

Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Buffer Overflow is an example of what?

A

Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Buffers are a general term for a block of memory reserved for storing data.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What tests the length of input before copying it into a buffer?

A

Bounds checking

17
Q

Many modern programming languages implement bounds checking automatically.

A

True

18
Q

Named after the small birds, miners used to take underground to warn them of dangerous conditions.

A

Canaries

19
Q

Most commonly used to attack websites that use databases is what?

A

Code injections

20
Q
  1. It needs to specify what data we’re retrieving from the database
  2. it needs to specify from what place in the database to retrieve the value
  3. It specifies that it only wants data for the account whose username equals a certain value
A

SQL Query

21
Q

SQL commands end with a what?

A

Semicolon

22
Q

Sanitize input by removing or modifying character before running database queries

A

True

23
Q

When a new exploitable bug is discovered that the software creators weren’t aware of?

A

Zero day vulnerability

24
Q

Black hat hackers rush to use the exploit for maximum benefit before white hat programmers release a patch for the bug.

A

True

25
Q

If bugs are left open on enough systems, it allows hackers to write a program that jump from computer to computer automatically.

A

Worms

26
Q

If a hacker can take over a large number of computers, they can be used together to form what?

A

Botnet

27
Q

Many purposes including sending huge volumes of spam, mining bitcoins using other people’s computing power and electricity, and launching Distributed Denial of Service or DDoS attacks against servers.

A

true

28
Q

What is where all computers in the botnet send a flood of dummy messages. This can knock services offline, either to force owners to pay a ransom or just to be evil?

A

DDoS

29
Q

Cyber attacks cost the global economy roughly ________ dollars annually and that figure will only increase as we become more reliant on computing systems.

A

half a trillion

30
Q
Cyberattacks happen on many different things including 
1.
2.
3.
4.
5.
6.
A
  1. Power Plants
  2. Electrical Grid
  3. Traffic Lights
  4. Water Treatment Plants
  5. Oil Refineries
  6. Air Traffic Control
31
Q

Many experts predict that the next major war will be fought in cyberspace, where nations are brought to their knees not by physical attack, but rather crippled economically and infra structurally through cyber warfare.

A

True