Attacks & Their Tools Flashcards

1
Q

What is an example of “hacktivism”?

A

A group of environmentalists launch a denial of service against an oil company that is responsible for a large oil spill.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which statement describes cybersecurity?

A

It is an ongoing effort to protect Internet-connected systems and the data associated with those systems from unauthorized use or harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What focus describes a characteristic of an indicator of attack (IOA)?

A

It focuses more on the motivation behind an attack and the means used to compromise vulnerabilities to gain access to assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the motivation of a white hat hacker?

A

Discovering weakness of networks and systems to improve the security level of these systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which risk management plan involves discontinuing an activity that creates a risk?

A

Risk Avoidance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which type of network threat is intended to prevent authorized users from accessing resources?

A

DoS Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What security tool allows a threat actor to hack into a wireless network and detect security vulnerabilities?

A

KisMac

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which statement describes the term attack surface?

A

It is the total sum of vulnerabilities in a system that is accessible to an attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which risk management strategy requires careful evaluation of the costs of loss, the mitigation strategy, and the benefits gained from the operation or activity that is at risk?

A

Risk Reduction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What characteristic describes script kiddies?

A

Inexperienced threat actors running existing scripts, tools, and exploits, to cause harm, but typically not for profit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What characteristic describes a gray hat hacker?

A

Individuals who commit cyber crimes but not for personal gain or to cause damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use forensic tools?

A

To detect any evidence of a hack or malware in a computer or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A company has contracted with a network security firm to help identify the vulnerabilities of the corporate network. The firm sends a team to perform penetration tests to the company network. Why would the team use applications such as Nmap, SuperScan, and Angry IP Scanner?

A

To probe network devices, servers, and hosts for open TCP or UDP ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly