Introduction to Ethical Hacking, Ethics, and Legality Flashcards

1
Q

Types of attacks

A

Active Attack OR Passive Attack

Inside Attack OR Outside Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Phases of hacking

A

Phase 1— Reconnaissance

Phase 2— Scanning

Phase 3— Gaining Access

Phase 4—Maintaining Access

Phase 5—Covering Tracks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Passive reconnaissance

A

Gathering information regarding a potential target without

the targeted individual’s or company’s knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Different Types of Hacker Classes

A

White hats

Black hats

Grey hats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Basic elements of security

CIA+1

A

Confidentiality

Integrity

Availability

Authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The three phases of a security evaluation plan?

A

Preparation

Conduct security evaluation

Conclusion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Back Orifice port

A

Port 31337

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The Four existing Regional Internet Registry (RIR’s)

A

RIPE NCC

LACNIC

ARIN

APNIC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Tools used for footprinting

A

Sam spade

NSLookup

Traceroute

Neotrace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The next step after footprinting

A

Scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What port should you look for to attempt a zone transfer?

A

TCP/53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly