Domain 6: Legal/Regulatory Flashcards

1
Q

What is the Computer Fraud and Abuse Act (CFAA)?

A

A U.S. law that criminalizes unauthorized access to computer systems and data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define GDPR and its relevance to ethical hacking.

A

The General Data Protection Regulation (GDPR) is a regulation in EU law on data protection and privacy, requiring ethical hackers to consider data privacy during assessments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the main principles of responsible disclosure?

A

Disclose vulnerabilities to the organization first, allow time for remediation, and follow up to ensure the issue is addressed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Explain the concept of “permission” in ethical hacking.

A

Permission involves obtaining explicit authorization from the system owner before conducting any tests or assessments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the role of the International Organization for Standardization (ISO) in cybersecurity?

A

ISO provides international standards, such as ISO/IEC 27001, for information security management systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the Digital Millennium Copyright Act (DMCA)?

A

A U.S. law that addresses copyright infringement on the internet, including the circumvention of digital rights management (DRM) technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Explain the concept of “due diligence” in cybersecurity.

A

The responsibility to take reasonable steps to protect data and systems, including implementing security measures and staying informed about threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is cross-site scripting (XSS)?

A

A vulnerability that allows attackers to inject malicious scripts into web pages viewed by other users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define the concept of “defense in depth.”

A

A security strategy that employs multiple layers of defense to protect information and systems from various threats.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a honeypot?

A

A decoy system or resource designed to attract and trap attackers to study their behavior and techniques.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Explain the role of two-factor authentication (2FA).

A

An extra layer of security that requires two forms of verification to access an account or system, typically combining something you know (password) with something you have (a smartphone or token).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly