Intro to Ethical Hacking Flashcards

1
Q

What are the 16 different hacker classes?

A

Script Kiddies
White hat hackers
Black hat hackers
Gray hat hackers
Hacktivists
Stat-sponsored hackers
Cyber terrorists
Corporate spies (industrial spies)
Blue hat hackers
Red hat hackers
Green hat hackers
Suicide hackers
Hacker teams
Insiders
Criminal syndicates
Organized hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Script Kiddies background?

A

Inexperienced, often young individuals using pre-made scripts or tools without understanding them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is White Hat Hackers background?

A

Professinoals in Cyber security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Black Hat Hackers background?

A

Individuals with extraordinary computing skills.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Grey Hat Hackers background?

A

SKilled hackers operating between ethical and unethical lines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Hacktivists background?

A

Politically or socially motivated indiviuals or groups.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is State-Sponsored Hackers background?

A

Highly trained professionals working for government agencies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Cyber Terrorists background?

A

Extremists using cyber attacks to promote political or religious beliefs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Corporate Spies (Industrial Spies) background?

A

Individuals hired by companies to gather intelligence on competitors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Blue Hat Hackers background?

A

Security professionals hired temporarily to test systems before product release.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Red Hat Hackers background?

A

Vigilantes targeting black hat hackers using aggressive methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Green Hat Hackers background?

A

Newcomers eager to learn hacking skills, often participating in online forums and communities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Script Kiddies motivations?

A

Thrill, recognition, fun.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is White Hat Hackers motivations?

A

Improving security, salary, reputation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Black Hat Hackers motivations?

A

Financial gain, data theft, causing harm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Gray Hat Hackers motivations?

A

Recognition, curisoity, financial gain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Hacktivists motivations?

A

Promoting a cause, social justics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is State-Sponsored Hackers motivations?

A

National security, espionage, political objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is Cyber Terrorists motivations?

A

Spreading fear, political or ideological goals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is Corporate Spies (Industrial Spies) motivations?

A

Financial gain, competitive advantage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is Blue Hat Hackers motivations?

A

Improving product security, reputation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is Red Hat Hackers motivations?

A

Cyber justice, disrupting malicious activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is Green Hat Hackers motivations?

A

Learning, curiosity, recognition.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is Script Kiddies cyber activity?

A

Running simple attacks like DDoS defacing websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is White Hat Hackers cyber activity?
Conducting penetration tests, vulnerability assessments.
26
What is Black Hat Hackers cyber activity?
Malware creation, phishing, ransomware, data breaches.
27
What is Grey Hat Hackers cyber activity?
Vulnerability discovery without permission, sometimes reported.
28
What is Hacktivists cyber activity?
DDoS attacks, defacing websites, data leaks.
29
What is State-Sponsored Hackers cyber activity?
Cyber espionage, infrastructure sabotage, data theft.
30
What is Cyber Terrorists cyber activity?
Cyber attacks on critical infrastructure, spreading propaganda.
31
What is Corporate Spies (Industrial Spies) cyber activity?
Industrial espionage, data theft, spying.
32
What is Blue Hat Hackers cyber activity?
Conducting security audits, penetration testing.
33
What is Red Hat Hackers cyber activity?
Hacking black hat infrastructure, disabling malicious networks.
34
What is Green Hat Hackers cyber activity?
Learning hacking techniques, experimenting with simple attacks.
35
What is Script Kiddies potential targets?
Small websites, online games forums.
36
What is White Hat Hackers potential targets?
Corporations, government agencies.
37
What is Black Hat Hackers potential targets?
Financial institutions, individuals, enterprises.
38
What is Gray Hat Hackers potential targets?
Various, including high-profile organisations.
39
What is Hacktivists potential targets?
Government sites, corporations, political groups.
40
What is State-Sponsored Hackers potential targets?
Other nations' government agencies, corporations.
41
What is Cyber Terrorists potential targets?
Critical infrastructure, public services.
42
What is Corporate Spies (Industrial Spies) potential targets?
Competitor companies.
43
What is Blue Hat Hackers potential targets?
Security profesionals hired temporarily to test system before product release.
44
What is Red Hat Hackers potential targets?
Various, typically low-risk targets.
45
What is Green Hat Hackers potential targets?
Various, typically low-risk targets.
46
Give a definition for Suicide Hackers.
Suicide hackers are individuals who aim to bring down critical infrastruture for a cause and who dont care about facing jail or any other punishment.
47
Give a definition for Hacker Teams.
A hacker team is a consortium of skilled hackers having their own resources and funding. They do attacks and develop tools with proper planning.
48
Give a definition for Insiders.
An insider is any employee or trusted person who has access to critical assets of an organisation.
49
Give a definition for Criminal Syndicates.
Criminal Syndicates are groups of individuals or communities that are involved in organised, planned and prolonged criminal activities.
50
Give a definition for Organised Hackers.
Organised Hackers are a group of hackers working together in criminal activities. Such groups are well organised in a hierarchical structure consisting of leaders and workers.
51
What does AI stand for?
Artificial Intelligence
52
What does ML stand for?
Machine Learning
53
How do AI and ML contribute to cyber security?
Using AI and ML in cyber security helps to identify new exploits and weaknesses which can be easily analyzed to mitigate further attacks.
54
How does AI improve accuracy in cybersecurity?
AI reduces human erros and increases the accuracy of vulnerability assessments.
54
How does Ai enhance cybersecurity efficency?
AI automates repetitive tasks like vulnerabliity scanning, monitoring network traffic and analyzing security threats.
55
Why is AI-driven cybersecurity scalable?
AI tools can handle large-scale environments and complex systems more efficiently than manual methods.
56
How does AI contribute to cost effectiveness in cybersecurity?
AI reduces operational costs by automating tasks and minimizing human intervention.
57
What is predictive analysis in AI driven cybersecurity?
AI detects potential security breaches by analyzing patterns and anomalies allwoing for proactive mitigation.
58
Why is ethical hacking necessary?
It is necessary as it allows counter attacks from malicious hackers by anticipating methods used by them to break into a system.
59
What does ethical hacking help predict?
It helps to predict various possible vulnerablities well in advance.
60
What can you do with the vulnerabilities ethical hacking helped predict?
Rectify them without incurring any kind of outside attack.
61
What are the 9 major uk laws about ethical hacking?
The copyright, ETC. and trademarks (offenses and enforcement) act 2002 Trademakrs act 1994 Computer misuse Act 1990 The network and information systems regulations 2018 Communications act 2003 the privacy and electronic communications Regulations 2003 Investigatory powers Act 2016 Regulation of investigatory powers act 2000 Data protection act 2018
62
What is ISO 27701:2022?
IT specifies the requirements and framework for establishing, implementing, maintianing and continually improving an ISMS to ensure cofidentiality, itegrity and availability of information.
63
What is ISO 27701:2019?
It provides guidelines for implementing a private information management system to help oragizations effectively manage privacy risks.
64
What is ISO 27002:2022?
THis paper offers a comprehensive framework fro implementing effective security controls to protect sensitive information and ensure regulatory compliance.
65
What is ISO 27005:2022?
It aids organizations in developing a structured framework for conducting throrough and effective information security risk assessments.
66
What is ISO 27018:2019?
This paper provides guidelines for implementing cloud specific controls designed to safeguard personal data.
67
What is ISO 27032:2023?
This standard assists organizations in enhancing their cybersecurity posture by addressing common internet security issues and fostering coordinated security efforts among stakeholders.
68
What is ISO 27033-7:2023?
It helps organizations secure and manage virtualization environments and mitigates the associated security risks.
69
What is ISO 27035-3:2023?
This standard helps organizations mitigate supply chain security risks by ensuring the secure acquisition and integration of products and services.
70
What is ISO 27040:2024?
It helps organizations mitigate the risks associated with data storage by applying data storage security measures across various storage devices, media and networks.
71
What is iso 27001:2013?
It provides a framework for arganizations to establish, implement, maintain and continuously improve an ISMS to protect sensitive information and manage security risks effectively.
72
Define passive attacks.
Passive attacks involve intercepting and monitoring network traffic and data flow on the target network and do not tamper with the data.
73
Give examples of passive attacks?
Footprinting Sniffing and eavesdropping Network traffic analysis Decryption of weakly encrypted traffic
74
Define active attacks.
Attive attacks tamper with the data in transit or disrupt communication or services between the systems to bypass or break into secured systems.
75
Give examples of active attacks?
Denial-of-service attack Firewall and IDS attack Malware attacks SQL injection
76
Define Close-in Attacks.
Close-in attacks are performed when the attacker is in close physical proximity with the target system or network.
77
What is the main goal of Close-in Attacks?
It is to gather or modify information or disrupt its access.
78
Give examples of Close-in attacks.
Social engineering.
79
Define Insider Attacks.
Insider attacks are performed by trusted persons who have physical access to the critical assets of the target.
80
Give examples of Insider Attacks.
Eavesdropping and wiretapping Theft of physical devices Social engineering Data theft and spoliation
81
Degine Distribution Attacks.
Distribution attacks occur when attackers tamper with hardware or software prior to installation.
82
Give examples of Distribution attacks.
Modification of software or hardware during production.
83
What are the 5 phases of CEH Hacking Methodology?
Reconnaissance Vulnerability Scanning Gaining Access Maintaining Access Clearing Tracks
83
What are the non-technical skills of an ehtical hacker?
The ability to quickly learn and adapt new technologies A strong work ethic and good problem solving and communication skills Commitment to an organization's security policies An awareness of local standards and laws
84
What is PCIDSS?
Payment Card Indusrty Data Security Standard is a proprietary information security standard for organizations that handle cardholder information for the major debit, credit, prepaid, e-purse, ATM and POS cards.
85
What are the stages of Cyber kill chain methodology?
Reconnaissance Weaponization Delivery Exploitation Installation Command and Control Action on Objectives
86
What is the Cyber kill chain methodology?
THe cyber kill chain methodology is a component of intelligence-driven defense for the identification and prevention of malicious intrusion activities. This methodology helps security professionals in identifying the steps that adversaries follow in order to accomplish their goals.