Intro Course Flashcards

1
Q

Tool in Kali for cracking passwords in brute force attacks (dictionary)

A

Hydra

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Linux Distribution System

A

Kali Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An attack that renders a machine unusable by flooding the target with information that causes a crash

A

DOS attack (denial of service attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

When a hacker places a sniffer between and catches the data between one host and another

A

MITM (Man in the middle) or on path attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Tool can be used to scan and map computers on a network

A

NMap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The step of the attack in which the attacker opens and maintains communication channel between the target computer and the attacker computer

A

Command and Control (phase 6)(Lockheed Martin kill chain)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

When a hacker is manipulating someone to get something he wants

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Three types of social engineering

A

Phishing attack, vishing attack, and Pretexting attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How is a Phishing attack done?

A

Via email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How is a Vishing attack done?

A

Via phone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How is a Pretexting attack done?

A

In person

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Works directly with the operation system and saves files to the file system

A

Desktop application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of 2 factor authentication?

A

To add an extra layer to the authentication process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Persistent module is another name for a backdoor

A

Installation (Phase 5)(Lockheed Martin kill chain)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Analyses misconfigured endpoints

A

Microsoft Defender ATP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an application?

A

A computer software designed for a specific task

17
Q

Software that allows us to manage the users

A

Active directory

18
Q

Tech that is used to detect and prevent unauthorized access to sensitive information (data breaches)

A

DLP Data Loss Prevention

19
Q

What is it when we improve the security of the operation system, we update the operation system to the latest version, and we remove unused features from the operation system

A

Hardening a server

20
Q

A command-line utility that create a new directory or folder in LINUX

A

MKDIR command

21
Q

When a user downloads a malicious program that encrypts their files and the hacker demands payment

A

Ransomware

22
Q

What is the primary purpose of a firewall?

A

to filter network traffic

23
Q

A command to list files and directories in LINUX

A

LS command

24
Q

What are the three States (forms) of data?

A

Use, transit, or rest

25
Q

What is used to secure data in transit

A

VPN (virtual private network)

26
Q

Used to divide a network into multiple zones

A

Segmentation

27
Q

Used to verify network connectivity between hosts

A

Ping command

28
Q

What do you call attacking vs reading about your target

A

Active attacks vs passive attack

29
Q

What is the primary objective of Incident Response based on NIST?

A

According to NIST it’s mitigating violations of security policies

30
Q

Reads content and generates new content from existing data

A

Generative AI

31
Q

Allows communication between devises in a small geographical area

A

LAN (Local Area Network)

32
Q

How does a data breach affect an organization?

A

Financial Impact, Legal Liability, and Reputation Loss

33
Q

What is risk?

A

Asset + vulnerability + threat = risk

34
Q

Which aspect of the CIA triad ensures data security?

A

Integrity

35
Q

What does the A in CIA stand for?

A

Availability

36
Q

A different attack method example. Outdated software, phishing email, malware infected attachment

A

Threat vector