Introduction to Ethical Hacking Flashcards

1
Q

APT

A

advanced persistent threat (APT) is a broad term used to describe an attack campaign in which an intruder, or team of intruders, establishes an illicit, long-term presence on a network in order to mine highly sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authentication Header(AH)

A

Which will digitally sign the packets. That will allow the company to guarantee integrity, authenticity, and non-repudiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Shrink-wrap code attack

A

Using default or off the shelf components, it happens if the code/script is not fine-tuned.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Electronic warfare

A

Uses radio electronic and cryptographic techniques to degrade communication. Radio electronic techniques attack the physical means of sending information, whereas cryptographic techniques use bits and bytes to disrupt the means of sending information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Intelligence-based warfare

A

Sensor-based technology that directly corrupts technological systems. Intelligence-based warfare is a warfare that consists of the design, protection, and denial of systems that seek sufficient knowledge to dominate the battlespace.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Command and control warfare (C2 warfare)

A

In the computer security industry, C2 warfare refers to the impact an attacker possesses over a compromised system or network that they control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Economic warfare

A

Warfare can affect the economy of a business or nation by blocking the flow of information. This could be especially devastating to organizations that do a lot of business in the digital world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

OWASP

A

Open Web Application Security Project, which is an open-source application security project that assists the organizations to purchase, develop and maintain software tools, software applications, and knowledge-based documentation for Web application security. It provides a set of tools and a knowledge base, which help in protecting Web applications and services. It is beneficial for system architects, developers, vendors, consumers, and security professionals who might work on designing, developing, deploying, and testing the security of Web applications and Web services.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

OSSTMM

A

Open-Source Security Testing Methodology Manual, compiled by Pete Herzog. It is a peer-reviewed methodology for performing high-quality security tests such as methodology tests: data controls, fraud and social engineering control levels, computer networks, wireless devices, mobile devices, physical security access controls, and various security processes. OSSTMM is a standard set of penetration tests to achieve security metrics. It is considered to be a de facto standard for the highest level of testing, and it ensures high consistency and remarkable accuracy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Host-based assessment

A

looks at the vulnerabilities of the devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Active assessment

A

means we are using a network scanner to look for hosts.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Passive assessment

A

means we are sniffing packets in a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Wireless network assessment

A

looks for vulnerabilities in the wireless network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly