Domain 2: Analysis/Assessment Flashcards
What are common scanning tools used in ethical hacking?
Nmap, Nessus, OpenVAS.
Explain the purpose of vulnerability assessment.
To identify, quantify, and prioritize vulnerabilities in a system.
What is a threat model?
A framework to identify and evaluate potential threats to an organization’s assets.
Describe social engineering.
A technique used to manipulate individuals into divulging confidential information.
What is footprinting?
The process of gathering information about a target system or network to identify potential attack vectors.
What is the purpose of enumeration in ethical hacking?
To extract detailed information about a target, such as user accounts, network shares, and services.
Describe the difference between active and passive reconnaissance.
Active reconnaissance involves directly interacting with the target system, while passive reconnaissance involves collecting information without direct interaction.