CEHv8 BOOTCAMP: MODULE 01-INTRODUCTION TO ETHICAL HACKING_SET-1 Flashcards

1
Q

What is Hack Value?

A

The notion among hackers that is worth doing or is interesting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Exploit?

A

A defined way to breach the security of an IT system through vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Vulnerability?

A

Existence of a weakness, design, or implementation error that can lead to an unexpected and undersirable event compromising the security of the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Target of Evaluation?

A

An IT system, Product, or component that is identified/subjected to a required security evaluation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Zero-Day Attack?

A

An attack that exploits computer application vulnerabilities before the software developer releases a patch for the vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Daisy Chaining?

A

Hackers who get away with database ttheft usuallycomplete their task, then backtrack to cover their tracks by destroying logs, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the 5 elements in Information Security?

A
  • Confidentiality
  • Integrity
  • Availability
  • Authenticity
  • Non-Repudiation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Information Security?

A

A state of well-being of information and infrastructure in which the possibility of theft, tampering, and disruption of information and services is kept low or tolerable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What 3 components can define level of security?

A
  • Functionality
  • Security
  • Usability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are 6 Information Security threats?

A
  • Natural Threats
  • Physical Threats
  • Human Threats
  • Network Threats
  • Host Threats
  • Application Threats
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are examples of Natural Threats?

A
  • Floods
  • Natural Disasters
  • Earthquakes
  • Hurricanes
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are examples of Physical Threats?

A
  • Loss or Damage of system resources
  • Physical intrusion
  • Sabotage, espionage, and errors
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are examples of Human Threats?

A
  • Hackers
  • Insiders
  • Social engineering
  • Lack of knowledge and awareness
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are examples of Network Threats?

A
  • Information gathering
  • Sniffing and eavesdropping
  • Spoofing
  • Session hijacking and Man-in-the-Middle
  • SQL injection
  • ARP Poisoning
  • Password-based attacks
  • Denial of service attack
  • Compromised-key attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are examples of Host Threats?

A
  • Malware attacks
  • Target Footprinting
  • Password attacks
  • Denial of service attacks
  • Arbitrary code execution
  • Unauthorized access
  • Privilege escalation
  • Back door Attacks
  • Physical security threats
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are examples of Application Threats?

A
  • Data/input validation
  • Authentication and Authorization attacks
  • Configuration Management
  • Informaiton disclosure
  • Session management issues
  • Buffer overflow issues
  • Cryptography attacks
  • Parameter manipulation
  • Improper error handling and exception management
  • Auditing and logging issues
17
Q

What does the term Information Warfare refer to?

A

The use of information communication technologies (ICT) to take competitive advantages over an opponent.

18
Q

What is Defensive Information Warfare?

A

Strategies and actions to defend against attacks on ICT assets.

19
Q

What is Offensive Information Warfare?

A

Information Warfare that involves attacks on ICT assets of an opponent.

20
Q

What are 8 Hacker Classes?

A
  • Black Hats
  • White Hats
  • Gray Hats
  • Suicide Hackers
  • Script Kiddies
  • Spy Hackers
  • Cyber Terrorists
  • State Sponsored Hackers
21
Q

What is Hactivism?

A

An act of promoting a political agenda by hacking, especially by defacing or disabling websites

22
Q

What are common targets of Hactivist?

A
  • Government agencies
  • Multinational corporations
  • Any entity perceived as bad/wrong by these groups/individuals.
23
Q

Where does Hactivism thrive?

A

The environment where information is easily accessible.

24
Q

What are the 5 phases of hacking?

A
  • Reconnaissance
  • Scanning
  • Gaining Access
  • Maintaining Access
  • Clearing Tracks
25
Q

What are 4 types of attacks on a system?

A
  • Operating System Attacks
  • Misconfiguration Attacks
  • Application Level Attacks
  • Shrink Wrap Code Attacks