Allen Test 1 Flashcards
Cryptology and Encryption, Securing your Infrastructure,
What does CIA stand for?
Confidentiality
Integrity
Availability
In block chain: When a node finds a proof-of-work, it ________ to all nodes.
broadcasts
In block chain: Each node collects new ______ into a block.
transactions
In block chain: Nodes create next block in chain, using previous _____
hash
In block chain: New transactions are broadcast to all ______.
nodes
In block chain: Each node works on finding a difficult proof-of-work for its _____
block
What is involved in the Information Security Model
- CIA
- Processing, storage, transmission
- Policy and Procedure, Technology, Education, training and awareness
What should only be done with complete permission and co-operation of the organization?
penetration testing
________ is the act of evaluating a system to locate weaknesses and vulnerabilities
Hacking
What helps organizations and security professionals to preemptively identify and resolve security issues
Hacking
A _______ hacker is typically a computer and networking expert who employ the same methods as a malicious hacker in attempts to penetrate computer systems on behalf of their owners
ethical (white hat)
A ____________ Hackers is one who uses their skills for unethical reasons and engage in malicious hacking for illegal purposes
Black Hat also known as crackers
A __________ hacker will pursue a hack and break the law, but does so in a non-malicious intent.
A grey Hat
A _______ _______ is an individual with little to no technical skills.
They simple use download-and-run hacking tools developed by others to perform their attacks and deface systems
Script Kiddie
A ______ is someone who hacks with political intentions, similar skills as White/Black hat hackers and use the same tools.The main goal is to increase public attention on a particular political matter
Hacktivist
Techniques such as _______ ________ are important tools to find vulnerabilities
reverse engineering
What are the three approaches to Hacking?
White box
Black Box Testing
Grey Box
In what hacking methodology is certain information about the target system(s) are made available prior to the test.
•the penetration team functions as insiders to get the information about the network and analyze the loop holes in the network
white box model
What hacking methodology does an ethical hacker has little to no prior knowledge of the system being attacked.
The goal of this type of attack is to simulate a malicious external or cyber warfare attack
Black box model
A _________ ________ utilizes security tools (typically automated) to identify, quantify, and prioritize the vulnerabilities identified in a particular system.
Vulnerability Assessment