Allen Test 1 Flashcards
Cryptology and Encryption, Securing your Infrastructure,
What does CIA stand for?
Confidentiality
Integrity
Availability
In block chain: When a node finds a proof-of-work, it ________ to all nodes.
broadcasts
In block chain: Each node collects new ______ into a block.
transactions
In block chain: Nodes create next block in chain, using previous _____
hash
In block chain: New transactions are broadcast to all ______.
nodes
In block chain: Each node works on finding a difficult proof-of-work for its _____
block
What is involved in the Information Security Model
- CIA
- Processing, storage, transmission
- Policy and Procedure, Technology, Education, training and awareness
What should only be done with complete permission and co-operation of the organization?
penetration testing
________ is the act of evaluating a system to locate weaknesses and vulnerabilities
Hacking
What helps organizations and security professionals to preemptively identify and resolve security issues
Hacking
A _______ hacker is typically a computer and networking expert who employ the same methods as a malicious hacker in attempts to penetrate computer systems on behalf of their owners
ethical (white hat)
A ____________ Hackers is one who uses their skills for unethical reasons and engage in malicious hacking for illegal purposes
Black Hat also known as crackers
A __________ hacker will pursue a hack and break the law, but does so in a non-malicious intent.
A grey Hat
A _______ _______ is an individual with little to no technical skills.
They simple use download-and-run hacking tools developed by others to perform their attacks and deface systems
Script Kiddie
A ______ is someone who hacks with political intentions, similar skills as White/Black hat hackers and use the same tools.The main goal is to increase public attention on a particular political matter
Hacktivist
Techniques such as _______ ________ are important tools to find vulnerabilities
reverse engineering
What are the three approaches to Hacking?
White box
Black Box Testing
Grey Box
In what hacking methodology is certain information about the target system(s) are made available prior to the test.
•the penetration team functions as insiders to get the information about the network and analyze the loop holes in the network
white box model
What hacking methodology does an ethical hacker has little to no prior knowledge of the system being attacked.
The goal of this type of attack is to simulate a malicious external or cyber warfare attack
Black box model
A _________ ________ utilizes security tools (typically automated) to identify, quantify, and prioritize the vulnerabilities identified in a particular system.
Vulnerability Assessment
What are the five phases of hacking?
- Reconnaissance
- Scanning
- Gaining access
- Maintaining access
- Covering tracks
_______ ___________ involves probing or directly interacting with the network to discover individual hosts, IP addresses, and services on the network
Active reconnaissance
What phase of hacking are hackers are trying to identify any further information, vulnerability or possible attack vector that can be used to assist to gain assess of a target
•port scanners, network mappers and vulnerability scanners.
Scanning
What phase of hacking utilizes vulnerabilities that were discovered are now exploited to gain some level of control over the target.
gaining access
In what phase of hacking do hackers want to ensure they retain their current access as well making it possible to come back to that machine for future exploitation and attacks?
Maintaining access
What are some good methods to gain and retain access to a network?
hackers use backdoors, rootkits, and Trojans
In what phase of hacking do you avoid detection by security personnel, continue using owned system, or to avoid being caught and legal action.
•Hackers must delete information from log files, deleting or hiding modified files and using other activities to try to blend in with regular user activities
Covering tracks
When hacking to securely manage information related to the engagement on the network, what should be used?
a secure file repository, face-to-face meetings phone calls, conferences and file encryption
The scope of a project specifically defines what is to be tested of a _____ ________.
penetration test
Defining the ______ helps the Pen Tester understands what is driving the project this will assist them in determine the goals, objectives and best course of action to take
Defining the scope
Whats outlines the particulars of who, what, where, why, when and the how of the Penetration Test?
This includes:
•specific dates and times of each phase
•blackout periods when the organization does not want testing to be done
•Locations being tested and when also define what type of testing is off limits.
“Rules of Engagement”
What are some feature of NMAP?
- Create a complete computer network map
- Find remote IP of any hosts.
- Get the OS system and software details.
- Detect open ports on local and remote systems.
- Audit server security standards.
- Find vulnerabilities - remote and local hosts
With a basic Nmap Scan you can scan against?
Basic Nmap Scan against IP, host, or ports
Nmap allows us to launch ______ attacks against our network testings
DOS
Using _______ can detect malware infections on remote hos
Nmap
What are passive vulnerabilities and exploits?
- Shoulder Surfing
- Release/selling of message content
- Traffic analysis
- Data capturing
What are Active vulnerabilities and exploits?
- Unauthorized login
- Wiretaps
- Denial of services
- Masquerading
- Message modifications
What are different ways of gaining unauthorized access to a network?
- ARP attack
- Brute force attack
- Denial-of-service attack
- Worms/viruses/Trojan horse
- Flooding
- Sniffing
- Redirected attacks
- Social Engineering
How can you mitigate breaches using risk management?
Process of establishing an acceptable level of risk for the organization by:
•Risk Analysis
•Determine likelihood that the vulnerability will risk the organization
•Seek out Threats
•Potential danger to information or data
•Assess Vulnerability
•Weakness in the system, technology, product and/or policy
•Implement Countermeasures
•Mitigate potential risk
•Risk can be mitigated, but cannot be eliminated
What are beneficial counter measures to implement to ensure networks security?
- NAT
- IDS/IPS
- Firewalls
- AAA(Using encryption)
- Proxy Services
- Training and awareness
- Policies, procedures and standards
Professional/individual must understand all aspects of computing _________ in order mitigate attacks and threats.
infrastructure
Where does passive reconnaissance acquire their information?
searches public record, internet searches, online tools
Does passive reconnaissance interact with the target?
no it does not home boy
Once the system is owned it can be used as a base to launch _______ or as a pivot point to dig deeper into the _______.
attack, network
In what phase of hacking does the real hacking begins, but this is also where the danger is
Gaining access
Which of the three tools is used for Network packet generating?
n diff
n ping
n cat
n ping
Which of the three tools is used to compare results of nmap scan?
n diff
n ping
n cat
n diff
Which of the three tools is used concatenating and redirecting sockets?
n diff
n ping
n cat
n cat
In nmap using a predefined set of scripts or by writing your own for vulnerabilty detection is called?
Nmap script engine (NSE)
In hacking what servers can you exectue a brute force attack?
MS SQL, FTP, or Word press