Kahoot - Intro to Ethical hacking Flashcards
hacking involves all BUT:
a. ) Altering the functionality or behavior of a ssytem
b. ) Done by both attackers and defenders
c. ) Working in a cloud to cover your tracks
d. ) Taking advantage of a system
c.)
Which color is not a hat that a hacker would wear?
a. ) Gray hat
b. ) black hat
c. ) Red hat
d. ) White hat
c.)
In hacking a purple team does…..
a. ) Compliance auditing
b. ) Defense (protect system)
c. ) Offense (attack systems)
d. ) Both offense and defense
d.)
All of the following are types of Malware EXCEPT:
a. ) Ad ware
b. ) Ransomware
c. ) Botnet
d. ) Trojan Horse
a.)
A common Attack Flow includes all the steps EXCEPT
a. ) Weaponization
b. ) Command & Control
c. ) Disclosure of Zero Day
d. ) Exploit & Execute
c.)
T or F A backdoor is used to gain access by reattacking a system over and over again?
F
A Zero day Vulnerability is
a. ) Zero refers to the number of times an APT used an exploit
b. ) No APT has found an exploit in the software
c. ) Has no patch and exploitable until mitigated
d. ) is not really a vulnerability yet
c.)
A common pen test OS is Kali Linux? T or F
T
Which one below is not a cert for cybersecurity professionals?
a. ) OWASP
b. ) CISM
c. ) CEH
d. ) OSCP
a.)
Which type of attack uses a system of compromised hosts to deploy an attack
a. ) Slowloris attack
b. ) Botnet
c. ) Low Orbit Ion Cannon
d. ) Web attack
b.)