Ethical Hacking 1 Flashcards
What term describes the hiding of information within other information, such as within a sound file or image?
Steganography
An wonder’s confidence that a system will behave according to its specifications is referred to as:
Assurance
What different attacks might be used by a hacker to gain access to a system?
- Denial-of-service
- Session Hijacking
- Stack-Based overflows
What is one of the three questions that an ethical hacker’s evaluation of a client’s information system seek to answer?
What can an intruder do with information found on the target system?
Which term refers to a breach in security?
Exposure
When conducting an ethical hacking assignment, which step is very important to conduct as it protects the ethical hacker from prosecution?
Prepare NDA documents.
What type of hacker attack is made possible by the fact that software developers will often use free libraries and code licensed from other sources in their programs?
Shrink-wrap code attacks
What two vulnerability research resources are government run resources?
- US-CERT
- National Vulnerability Database
Which phase of an attack is when the attacker begins to actively probe the target for vulnerabilities that can be exploited?
Scanning
When an attacker relies on publicly available information, social engineering, and dumpster diving as a means of gathering information, what type of reconnaissance is being done?
Passive reconnaissance
A hacker that believes in full disclosure of information is the best way to ensure that the average person will be able to make use of it is considered what class of hacker?
Grey Hat
In the conclusion phase of an ethical hacking assignment, which of the following procedures should be followed?
Data that is kept for long term clients must be encrypted and stored offline.
What is the usually the first phase of an attack?
Reconnaissance
Which category of ethical hacker should inadvertently put their client at risk from future attacks?
Former Black hats
What term is also used to describe an ethical hacker, which is a security professional who employs their hacking skills for defensive purposes?
White hat