M3 -(Network Security Concepts) Flashcards
Reviewer
What security term is used to describe anything of value to the organization? It includes people, equipment, resources, and data.
Asset
What security term is used to describe a weakness in a system, or its design, that couuld be exploited by a threat?
Vulnerability
What security term is used to describe a potential danger to a company’s assets, data, or network functionality?
Threat
What security term is used to describe a mechanism that takes advantage of a vulnerability?
Exploit
What security term is used to describe the counter-measure for a potential threat or risk?
Mitigation
What security term is used to describe the likelihood of a threat to exploit the vulnerability of an asset, with the aim of negatively affecting an organization?
Risk
Which type of hacker is described in the scenario: After hacking into ATM machines remotely using a laptop, I worked with ATM manufacturers to resolve the security vulnerabilities that I discovered.
Gray Hat
Which type of hacker is described in the scenario: From my laptop, I transferred $10 million to my bank account using victim account numbers and PINs after viewing recordings of victims entering the numbers.
Black Hat
Which type of hacker is described in the scenario: My job is to identify weaknesses in my company’s network.
White Hat
Which type of hacker is described in the scenario: I used malware to compromise several corporate systems to steal credit card information. I then sold that information to the highest bidder.
Black Hat
Which type of hacker is described in the scenario: During my research for security exploits, I stumbled across a security vulnerability on a corporate network that I am authorized to access.
White Hat
Which type of hacker is described in the scenario It is my job to work with technology companies to fix a flaw with DNS.
White Hat
What penetration testing tool uses algorithm schemes to encode the data, which then prevents acccess to the data?
Encrpytion Tools
What penetration testing tool is used by black hats to reverse engineer binary files when writing exploits? They are also used by white hats when analyzing malware.
Debuggers
What penetration testing tool is used to probe and test a firewall’s robustness?
Packet Crafting Tools
What penetration testing tool is used by white hat hackers to sniff out any trace of evidence existing in a computer?
Forensic Tools
What penetration testing tool identifies whether a remote host is susceptible to a security attack?
Vulnerability Exploitation Tools
What malware executes arbitary code and installs copies of itself in the memory of the infected computer? The main purpose of this malware is to automatically replicate from system to system across the network.
Worm
What malware is non-self-replicating type of malware? It often contains malicious code that is designed to look like something else, such as a legitimate application or file. It attacks the device from within.
Trojan Horse
What malware is used to gather information about a user and then, without the user’s consent, sends the information to another entity?
Spyware
What malware typically displays annoying pop-ups to generate revenue for its author?
Adware
What malware is installed on a compromised system and provides privileged access to the threat actor?
Rootkit
What malware denies access to the infected computer system and demands payment before the restrictino is removed?
Ransomware