Ethical hacking Flashcards

1
Q

What are the five phases of ethical hacking?

A
  1. Reconnaissance
  2. Scanning
  3. Gaining Access
  4. Maintaining Access
  5. Covering Tracks.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is social engineering in cybersecurity?

A

The manipulation of individuals into divulging confidential information, often through deception.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a phishing attack?

A

A type of social engineering attack where attackers impersonate legitimate institutions to steal sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is footprinting?

A

The process of gathering as much information as possible about a target system to find ways to compromise it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a brute-force attack?

A

An attack where every possible password or key combination is tried until the correct one is found.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a backdoor?

A

A method for bypassing normal authentication to gain unauthorized access to a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is SQL injection?

A

A code injection technique used to attack data-driven applications by inserting malicious SQL statements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is cross-site scripting (XSS)?

A

An attack where an attacker injects malicious scripts into content from a trusted website, which is then executed by users’ browsers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a denial-of-service (DoS) attack?

A

An attack aimed at making a system or service unavailable by overwhelming it with traffic or data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is privilege escalation?

A

A technique where an attacker gains elevated access to resources that are normally protected from an application or user.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a honeypot in cybersecurity?

A

A decoy system set up to lure and analyze attacks, helping to improve defenses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is malware?

A

Malicious software designed to disrupt, damage, or gain unauthorized access to computer systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly