Intro Course Flashcards

1
Q

Tool in Kali for cracking passwords in brute force attacks (dictionary)

A

Hydra

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Linux Distribution System

A

Kali Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An attack that renders a machine unusable by flooding the target with information that causes a crash

A

DOS attack (denial of service attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When a hacker places a sniffer between and catches the data between one host and another

A

MITM (Man in the middle) or on path attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Tool can be used to scan and map computers on a network

A

NMap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The step of the attack in which the attacker opens and maintains communication channel between the target computer and the attacker computer

A

Command and Control (phase 6)(Lockheed Martin kill chain)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When a hacker is manipulating someone to get something he wants

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Three types of social engineering

A

Phishing attack, vishing attack, and Pretexting attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How is a Phishing attack done?

A

Via email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How is a Vishing attack done?

A

Via phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How is a Pretexting attack done?

A

In person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Works directly with the operation system and saves files to the file system

A

Desktop application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of 2 factor authentication?

A

To add an extra layer to the authentication process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Persistent module is another name for a backdoor

A

Installation (Phase 5)(Lockheed Martin kill chain)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Analyses misconfigured endpoints

A

Microsoft Defender ATP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an application?

A

A computer software designed for a specific task

17
Q

Software that allows us to manage the users

A

Active directory

18
Q

Tech that is used to detect and prevent unauthorized access to sensitive information (data breaches)

A

DLP Data Loss Prevention

19
Q

What is it when we improve the security of the operation system, we update the operation system to the latest version, and we remove unused features from the operation system

A

Hardening a server

20
Q

A command-line utility that create a new directory or folder in LINUX

A

MKDIR command

21
Q

When a user downloads a malicious program that encrypts their files and the hacker demands payment

A

Ransomware

22
Q

What is the primary purpose of a firewall?

A

to filter network traffic

23
Q

A command to list files and directories in LINUX

A

LS command

24
Q

What are the three States (forms) of data?

A

Use, transit, or rest

25
What is used to secure data in transit
VPN (virtual private network)
26
Used to divide a network into multiple zones
Segmentation
27
Used to verify network connectivity between hosts
Ping command
28
What do you call attacking vs reading about your target
Active attacks vs passive attack
29
What is the primary objective of Incident Response based on NIST?
According to NIST it's mitigating violations of security policies
30
Reads content and generates new content from existing data
Generative AI
31
Allows communication between devises in a small geographical area
LAN (Local Area Network)
32
How does a data breach affect an organization?
Financial Impact, Legal Liability, and Reputation Loss
33
What is risk?
Asset + vulnerability + threat = risk
34
Which aspect of the CIA triad ensures data security?
Integrity
35
What does the A in CIA stand for?
Availability
36
A different attack method example. Outdated software, phishing email, malware infected attachment
Threat vector