Intro To Networking Security Flashcards

1
Q

Advanced persistent threat (APT)

A

Malware that waits to cause damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Zero day vulnerabilities

A

Issues with the code that are not yet known but will need to be routinely fixed with patches as they are discovered

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Blue, red, white and purple teams (iterate and improve model)

A

The blue team defends, the red team attacks, white observes, and then the teams debrief and cross train each other to repeat the process (purple).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

White hat hackers

A

IT professionals with authorization to hack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Black hat hackers

A

People without authorization that typically hack for profit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Gray hat hackers

A

Hackers who do not have permission but are not malicious in their attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Nation states

A

Nations states present a unique threat to software as they have significantly more funding than single hackers or even hacking groups. Nation states will use hackers for industrial espionage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Script kiddies

A

People who hack for entertainment/ curiosity potentially because they are new to hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Wiretapping

A

Electronic eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Port scanning

A

Checks all TCP ports to determine what services/ applications are running on the victims device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Taking control

A

Using input boxes in order to type special commands that give outsiders control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Spoofing

A

Electronic impersonation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Denial of service

A

Attacks that make things unavailable for those who need them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Social engineering

A

Utilizing social interaction in order to gain unauthorized access or information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Honey pot

A

A server/ device that looks authentic and distracts would be hackers from the actual information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Tar pit

A

A version of the honeypot that seeks out information about the attacker

17
Q

CIA triad

A

Confidentiality: prevents an unauthorized user from accessing, copying or transmitting information
Integrity: helps identify the trustworthiness of information
Availability: ensures that data is always accessible to the authorized users