Hacking Flashcards

1
Q

Cybercriminal (Black Hat)

A

A hacker who violates computer security for personal gain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Social Engineering

A

Tricking people into breaking normal security rules and procedures and/or divulging personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Trojan

A

A malicious program that pretends to be benign/normal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The word “malware” comes from the term?

A

Malicious Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Phishing

A

Sending a fake email that looks like it’s from a real company, to fool people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hactivist

A

Subversive use of computer systems to promote a political/social agenda.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Asymmetric encryption

A

Uses a key-pair, a public key and a private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which type of attack does not require human assitance?

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Zero-day exploit

A

Taking advantage of a software vulnerability on the day it is discovered, before the developers can patch it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which form is for Biometrics

A

It is a known and registered physical attribute of a user specifically used for verifying their identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ransomware

A

A virus that encrypts your files then demands payment to decrypt them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Malicious Insider

A

A hacker who uses their access to harm their employer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DDOS

A

A malicious attempt to make an internet/network server unavailable to legitimate users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Pharming

A

Having users directed to a fake website instead of a genuine website, to fool them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is cyber security?

A

the practice of protecting systems, networks, and programs from digital attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which backup strategy includes only the files and software that have changed since the last full backup?

A

Incremental

17
Q

Certified Ethical Hacker (White Hat)

A

An expert hacker who uses abilities for good, ethical, legal purposes.

18
Q

Hacker

A

Is a person who breaks into computers, usually by gaining access to administrative controls.

19
Q

Virus

A

A malicious file that can attach to other files and replicate when the user shares the file.

20
Q

Which of these is regularly used to secure online communication?

A

Public-key encryption

21
Q

Static heuristic

A

Decompile and look for source code, and compare against heuristic database of existing, known viruses.

22
Q

Dynamic heuristic

A

Lets the program run in a controlled situation (sandbox) while antivirus observes actions.

Strange actions e.g. deleting files and duplicating, quarantines the program.

23
Q

Physical security

A

Fire detection and supression systems, CCTV, locks, biometrics, and ensuring that the hardware is in a safe location.

24
Q

Encryption

A

Converting data into an illegible, scrambled format so it cannot be understood by unauthorsised parties. Uses an encryption algorithm and a unique key.

Key needed to convert other format back to plaintext

25
Q

Audit trails

A

Improve accountability by keeping track of who made what changes (and when) during development.

26
Q

Blagging

A

Creating and using an invented scenario to engage a targeted victim in divulging personal info.

27
Q

Acceptable Use Policy

A

A collection of rules and procedures that employees are required to follow in order to protect their organisation’s systems and networks.

28
Q

Quid pro quo

A

QPP means “something for something”. Provides a benefit in exchange for information. e.g You won an iPad!

29
Q

Baiting

A

The promise of cash or goods that people with malicious intent use to entice victims e.g. offering free music or movie downloads to trick users into revealing their login credentials.