Ethical Hacking Flashcards

1
Q

What is Ethical Hacking?

A

An authorised attempt to gain unauthorised access to a computer system, application or data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the term “Cracker” Mean?

A

A hacker who uses their skills and toolset for destructive or offensive purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of a security professional?

A

To test their network and systems security for vulnerabilities using the same tools that may be used against them in an offensive attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a White Hat Hacker?

A

An ethical hacker is a security expert employed by a company to carryout penetration testing without malicious intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Grey Hat Hacker?

A

A blend of both black hat and white hat hacking. Their intention is not inherently malicious.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Black Hat Hacker?

A

Unethical hackers who break into computer networks with malicious intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the Phases of ethical hacking?

A

1- Reconnaissance

2- Scanning

3- Gaining Access

4- Maintaining Access

5- Covering Tracks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Cyber Resilience?

A

How quickly and efficiently a person or company can recover from a cyber attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the elements of security?

A

1- Confidentiality (Inception - unauthorised access).

2- Integrity (Modification of data).

3- Availability (Interpretation of service).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is reconnaissance?

A

The act of gathering preliminary data or intelligence on a specific target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is active reconnaissance?

A

In active recon the hacker engages directly with the target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is passive reconnaissance?

A

Non direct engagement with the target recon is preformed through an intermediary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the reasons for hacking?

A

1- Sabotage - DOS/DDOS.
2- Fraud/Forgery - Financial theft, extortion/sextortion.
3- Hacktivist - Socially/ Politically motivated crime.
4- Publicity - To publicly demonstrate hacking skills by exposing security vulnerabilities
5- Curiosity - To uncover secret
government/organisational knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the different types of cyber attacks?

A
1- Buffer overflow.
2- Denial of service/distributed denial of service 
     (DOS/DDOS).
3- Brute force password attacks.
4- Back doors and trojans.
5- Man in the middle.
6- Rogue access point.
7- VLAN hopping.
8- Social engineering.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the Computer Misuse Act fundamentals?

A

1- Unauthorised access to computer material.
2- Access to computer material with malicious intent.
3- Intent to impair computer operations.
4- Hacking and spreading viruses.
5- Only when you delete, move or copy a file have you committed an offence.
6- Obtaining details through criminal means.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Tailgating/Piggybacking?

A

The process of following an employee into a building to surpass any security the organisation may have to control access.

17
Q

What is Baiting?

A

To exploit the greed or curiosity of an employee by planting usb devices pre-loaded with malware.

18
Q

What is Spear Phishing?

A

Targets message based characteristics of the job positions or the contacts of a victim.

19
Q

What is Whaling/CEO fraud?

A

Targeting high level decision makers within an organisation such as CEOS/CFOS.

20
Q

What are the different types of Scanning ports?

A

1- ICMP: Internet control message protocol.
Uses ping sweeping to identify active IP
addresses.
2- TCP: Transmission control protocol
Used by networked computers to
communicate.
3- UDP: User Datagram Protocol.
Sends packets to UDP ports, one-way, no
response necessary.
4- SYN:
Searches for open ports, but does not
complete the handshake. The port
acknowledges packet, then forgets it received
it.
5- ACK:
This is a flag used to acknowledge packets
have been received.
6- FIN:
The FIN flag closes a connection to a port after the
packet has been received.
7- Telnet:
Telnet is used to establish a remote login connect on another computer.
8- SSH:
SSH is a linux equivalent of a telnet designed for remote log in via a secure channel.

21
Q

What is stack finger printing?

A

scanning the target network so, the final foot printing step can be preformed.

22
Q

What are the two primary methods of finger printing?

A

1- Banner grabbing.

2- Active stack fingerprinting.

23
Q

What is DNS Enumeration?

A

The process of locating all DNS servers and their corresponding records for an organisation.