Ethical Hacking 1 Flashcards

1
Q

What term describes the hiding of information within other information, such as within a sound file or image?

A

Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An wonder’s confidence that a system will behave according to its specifications is referred to as:

A

Assurance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What different attacks might be used by a hacker to gain access to a system?

A
  • Denial-of-service
  • Session Hijacking
  • Stack-Based overflows
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is one of the three questions that an ethical hacker’s evaluation of a client’s information system seek to answer?

A

What can an intruder do with information found on the target system?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which term refers to a breach in security?

A

Exposure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When conducting an ethical hacking assignment, which step is very important to conduct as it protects the ethical hacker from prosecution?

A

Prepare NDA documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of hacker attack is made possible by the fact that software developers will often use free libraries and code licensed from other sources in their programs?

A

Shrink-wrap code attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What two vulnerability research resources are government run resources?

A
  • US-CERT

- National Vulnerability Database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which phase of an attack is when the attacker begins to actively probe the target for vulnerabilities that can be exploited?

A

Scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

When an attacker relies on publicly available information, social engineering, and dumpster diving as a means of gathering information, what type of reconnaissance is being done?

A

Passive reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A hacker that believes in full disclosure of information is the best way to ensure that the average person will be able to make use of it is considered what class of hacker?

A

Grey Hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In the conclusion phase of an ethical hacking assignment, which of the following procedures should be followed?

A

Data that is kept for long term clients must be encrypted and stored offline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the usually the first phase of an attack?

A

Reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which category of ethical hacker should inadvertently put their client at risk from future attacks?

A

Former Black hats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What term is also used to describe an ethical hacker, which is a security professional who employs their hacking skills for defensive purposes?

A

White hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In ethical hacking testing, what approaches exist for the ethical hacker to choose from depending on how much information is known about the target system?

A

Black Box Testing,0, Grey Box testing, White box Testing

17
Q

Which attack approach to ethical hacking deals with the ethical hacker trying to extract the data from devices, such as laptop computers and PDAs?

A

Stolen equipment attack

18
Q

What type of attack is initiated on a network by an authorized user?

A

An inside attack

19
Q

Which three concepts can be arranged in a triangle to depict how products are often developed

A

Security, functionality, ease of use

20
Q

How does an attacker usually gain access to a system?

A

By exploiting on a vulnerability