Module 1: Essential Knowledge Flashcards

1
Q

Level 1 - OSI

A

Physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Level 2 - OSI

A

Data Link

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Level 3 - OSI

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Level 4 - OSI

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Level 5 - OSI

A

Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Level 6 - OSI

A

Presentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Level 7 - OSI

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Level 1 - PDU

A

Bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Level 2 - PDU

A

Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Level 3 - PDU

A

Packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Level 4 - PDU

A

Segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Level 5 PDU -

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Level 6 - PDU

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Level 7 - PDU

A

Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Level 1 - TCP/IP

A

Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Level 2 - TCP/IP

A

Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Level 3 - TCP/IP

A

Internet/Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Level 4 - TCP/IP

A

Network Access/ Interface

19
Q

TCP/IP Handshake

A

Ack
Syn Ack
Ack

20
Q

1st Stage - Hacking

A

Reconnaissance

21
Q

2nd Stage - Hacking

A

Scanning + Enumeration

22
Q

3rd Stage - Hacking

A

Gaining Access

23
Q

4th Stage - Hacking

A

Maintaining Access

24
Q

5th Stage - Hacking

A

Covering Tracks

25
Q

2 Types of Access Control

A

MAC & DAC

26
Q

Security Triangle?

A

Security, Functionality & Usability

27
Q

1st Stage of Risk Management

A

Risk Identification

28
Q

2nd Stage of Risk Management

A

Risk Assessment

29
Q

3rd Stage of Risk Management

A

Risk Treatment

30
Q

4th Stage of Risk Management

A

Risk Tracking

31
Q

5th Stage of Risk Management

A

Risk Review

32
Q

3 types of security controls

A
  1. Physical
  2. Technical
  3. Administrative
33
Q

3 other types of security controls

A
  1. Preventative
  2. Detective
  3. Corrective
34
Q

What is BIA

A

Business Impact Analysis

35
Q

What is MTD

A

Maximum Tolerable Downtime

36
Q

What is BCP

A

Business Continuity Plan

37
Q

What is DRP

A

Disaster Recovery Plan

38
Q

3 Pillars of IT security

A

Confidentiality, Integrity, Availablility

39
Q

Stage 1 of Pen Testing

A

Preparation Phase

40
Q

Stage 2 of Pen Testing

A

Assessment Phase

41
Q

Stage 3 of Pen Testing

A

Conclusion Phase

42
Q

What is Black Box Testing

A

The pen tester has NO knowledge of the ToE. Simulates an outside attacker

43
Q

What is White Box Testing

A

Opposite of Black Box Testing

44
Q

What is Grey Box Testing

A

similar to white box testing, but the Ethical Hacker mimics that of an insider. The goal is to get privilege escalation.