CPE-PC 321 Lec 1 Flashcards

1
Q

The practice of testing a system, network, or application for security vulnerabilities with permission to identify and fix security flaws.
a. Black Hat Hacking
b. Ethical Hacking
c. Malware Analysis
d. Data Encryption

A

b. Ethical Hacking
Ethical hacking involves authorized security testing to find and address weaknesses before malicious hackers exploit them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A simulated cyberattack designed to evaluate the security of a system by identifying and exploiting vulnerabilities.
a. Penetration Testing
b. Social Engineering
c. Phishing Attack
d. Code Injection

A

a. Penetration Testing
Penetration testing (pen testing) helps organizations assess their defenses by simulating real-world cyberattacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A process that identifies and lists security vulnerabilities in a system but does not exploit them.
a. Vulnerability Assessment
b. Network Hardening
c. Social Engineering
d. DDoS Attack

A

a. Vulnerability Assessment
A vulnerability assessment scans and prioritizes potential security risks without actively exploiting them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The process of evaluating an organization’s security policies, procedures, and access controls to ensure compliance with security best practices.
a. Security Audit
b. Incident Response
c. Risk Assessment
d. Security Test

A

d. Security Test
A security test analyzes security measures to verify their effectiveness and compliance with policies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A hacker who gains unauthorized access to systems for personal gain or malicious intent.
a. Ethical Hacker
b. White Hat Hacker
c. Black Hat Hacker
d. Penetration Tester

A

c. Black Hat Hacker
Black hat hackers exploit systems illegally for malicious purposes, unlike ethical hackers who work with permission.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The type of penetration testing where the tester has no prior knowledge of the system and must discover vulnerabilities independently.
a. White Box Testing
b. Black Box Testing
c. Gray Box Testing
d. Open Source Testing

A

b. Black Box Testing
Black box testing simulates a real-world cyberattack where the tester gathers information without prior knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A derogatory term for an inexperienced hacker who uses pre-written tools without understanding their functionality.
a. Script Kiddie
b. Cyber Activist
c. Network Administrator
d. Red Team Analyst

A

a. Script Kiddie
Script kiddies rely on tools created by others to launch attacks without deep knowledge of hacking techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A hacker who breaks into systems for political or social activism purposes.
a. White Hat Hacker
b. Hacktivist
c. Network Engineer
d. Cybersecurity Consultant

A

b. Hacktivist
Hacktivists use hacking to promote political or social causes, often targeting governments or corporations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A group of ethical hackers who simulate real-world cyberattacks to test an organization’s security defenses.
a. Blue Team
b. Red Team
c. White Team
d. Green Team

A

A9: b. Red Team
The red team performs offensive security tests to identify weaknesses, while the blue team focuses on defense.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A set of guidelines and methodologies used to perform security tests on networks, systems, and applications.
a. ISO 27001
b. OSSTMM
c. NIST Framework
d. CIS Controls

A

b. OSSTMM (Open Source Security Testing Methodology Manual)
OSSTMM provides standardized security testing methodologies for penetration testers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An industry-recognized certification for ethical hackers that focuses on penetration testing techniques.
a. CCNA Security
b. CEH (Certified Ethical Hacker)
c. PMP Certification
d. AWS Security Certification

A

b. CEH (Certified Ethical Hacker)
The CEH certification, provided by EC-Council, validates skills in ethical hacking and penetration testing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The set of rules that users must follow when using an organization’s network or internet services.
a. Firewall Policy
b. Cybersecurity Framework
c. Acceptable Use Policy (AUP)
d. Risk Management Plan

A

c. Acceptable Use Policy (AUP)
An AUP defines acceptable and prohibited behaviors to ensure network security and responsible usage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The process of probing a system for open ports to identify active services and vulnerabilities.
a. Port Scanning
b. Data Encryption
c. Traffic Filtering
d. DDoS Mitigation

A

a. Port Scanning
Port scanning is used in penetration testing to detect open ports and identify potential entry points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A legal document that grants ethical hackers permission to perform security testing on a system.
a. NDA Agreement
b. Service-Level Agreement (SLA)
c. Authorization Contract
d. Penetration Testing Agreement

A

d. Penetration Testing Agreement
This document ensures that ethical hackers have legal authorization to test a system and outlines the testing scope.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A secure connection that encrypts internet traffic between a user’s device and a remote server.
a. IDS (Intrusion Detection System)
b. VPN (Virtual Private Network)
c. Honeypot
d. Firewalls

A

b. VPN (Virtual Private Network)
VPNs encrypt data to provide secure remote access and protect online activity from eavesdropping.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A federal law that prohibits unauthorized access to computer systems, data theft, and cyberattacks.
a. GDPR
b. CFAA (Computer Fraud and Abuse Act)
c. PCI-DSS
d. HIPAA

A

b. CFAA (Computer Fraud and Abuse Act)
The CFAA is a U.S. federal law that criminalizes unauthorized computer access and cybercrimes.

17
Q

A type of hacking where an attacker misleads an employee into revealing confidential information.
a. Social Engineering
b. SQL Injection
c. Phishing
d. DDoS Attack

A

a. Social Engineering
Social engineering exploits human psychology to manipulate victims into disclosing sensitive information.

18
Q

A cybersecurity professional responsible for detecting, analyzing, and responding to cyber threats.
a. Penetration Tester
b. Network Engineer
c. SOC Analyst
d. Cybersecurity Consultant

A

c. SOC Analyst
Security Operations Center (SOC) analysts monitor and respond to security incidents in real-time.

19
Q

A security concept that ensures only authorized users have access to specific data or systems.
a. Access Control
b. Data Encryption
c. Network Segmentation
d. Authentication

A

a. Access Control
Access control mechanisms regulate permissions based on user roles to prevent unauthorized access.

20
Q

The cybersecurity principle that users should only have the minimum level of access required to perform their jobs.
a. Zero Trust Security
b. Least Privilege
c. Multi-Factor Authentication
d. Data Masking

A

b. Least Privilege
The principle of least privilege limits user access rights to minimize security risks and prevent unauthorized actions.