Ethical Hacking Flashcards

1
Q

Attack

A

Occurs when a system is compromised based on a vulnerability by an unknown exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Availability

A

Authorized personnel accessing the data at appointed times. Involves a comprehensive planning of hardware, software, facility, people, and connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CIA Triad

A

A model promoted to define and practice policies related to formation security; uses confidentiality, integrity, and availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Confidentiality

A

Keeping access to the information only to the intended audience; does two things: ensures that the right people get the intended information and prevents sensitive information from reaching the wrong people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Defense-in-depth

A

The use of layered mechanisms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Exploit

A

Written to take advantage of a vulnerability; could be a piece of software; a technology; or data that can cause damage or change the behavior of a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

External Testing

A

Focused on the server’s infrastructure and underlying software pertaining to the target; can be performed with no prior knowledge of the site or with full disclosure of the topology and environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hacking

A

The skill of exploring various security breaches and posting unwanted content on websites, stealing data, etc.; concentrates on exploits and vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Integrity

A

Maintaining the sanctity of information and keeping the data accurate throughout its life,
whether it is on the same computer or shared over a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly