Introduction to Ethical Hacking (Glossary) Flashcards

1
Q

occurs when a system is compromised based on a vulnerability by an unknown exploit

A

Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

authorized personnel accessing the data at appointed times. Involves a comprehensive planning of hardware, software, facility, people, and connectivity.

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

malicious hackers that try to hack systems with malicious intent

A

Black hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

a model promoted to define and practice policies related to information security; uses confidentiality, integrity, and availability

A

CIA Triad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

keeping access to the information only to the intended audience; does two things: ensures that the right people get the intended information and prevents sensitive information from reaching the wrong people

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the use of layered security mechanisms; the layers could be data, applications, host levels, Internet networks, perimeter levels, physical securities, etc.

A

Defense-in-depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

testing the resources for a good cause and for the betterment of technology; another term for “penetration testing.”

A

Ethical Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

written to take advantage of a vulnerability; could be a piece of software; a technology; or data that can cause damage or change the behavior of a computer

A

Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

focused on the server’s infrastructure and underlying software pertaining to the target; can be performed with no prior knowledge of the site or with full disclosure of the topology and environment

A

External Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

hackers that can aid companies in informing them about any vulnerabilities they have found, but are not hired by the companies to perform such tests

A

Gray hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

the skill of exploring various security breaches and posting unwanted content on websites, stealing data, etc.; concentrates on exploits and vulnerabilities

A

Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

insiders who have authorization to access systems, and hackers who use exploits to attack

A

Human threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

maintaining the sanctity of information and keeping the data accurate throughout its life, whether it is on the same computer or shared over a network

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

any type of program that is created with the intent to cause damage, steal data, or abuse computer system resources; includes computer viruses, worms, and Trojan horses

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

can be a flood causing areas to be waterlogged, or a hurricane or a tornado causing a lot of damage.; often impact the availability of systems

A

Natural threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a fix to a vulnerability

A

Patch

17
Q

uses the same methods a hacker uses to gain unauthorized access to a network or system with a view to compromise them, but uses the methods to help companies

A

Penetration Testing

18
Q

naïve hackers try hard to get their hands on such zero-day attacks, instead of writing their own

A

Script Kiddies

19
Q

caused by malware, zero-day attacks, exploits, or web attacks

A

Technology threats

20
Q

a weak link in the software, settings, etc., through which, if not fixed early, someone can get access to the computer, application, and/or network and can cause damage

A

Vulnerability

21
Q

gets permission from the data owner before any hacking and use their hacking skills for defensive purposes only. They use their knowledge and skills to locate weaknesses and implement countermeasures and for defense purposes and preventing losses.

A

White hat

22
Q

exploits that have not been published

A

Zero-day Attack