Module 1 - Introduction to Ethical Hacking Flashcards
Which set of regulations is concerned with protecting a patient’s medical records?
A) ISO 2002
B) PCI DSS
C) PII
D) HIPAA/PHI
D
In which phase of the Cyber Kill Chain would an attacker exfiltrate data from your organization?
A) Weaponization
B) Delivery
C) Actions on Objectives
D) Command and Control
E) Exploitation
C
Which security strategy requires using several, varying methods to protect IT systems against attacks?
A) Three-way handshake
B) Exponential backoff algorithm
C) Covert channels
D) Defense in depth
D
During a pen-test, you’ve obtained several employee e-mail addresses from their company website. At which phase of the Cyber Kill Chain would you then create a client-side backdoor in order to send it to the victims via e-mail?
A) Reconnaissance
B) Weaponization
C) Delivery
D) Exploitation
E) Installation
F) Command and Control
G) Actions on Objectives
B
In which phase of Incident Handling & Response (IH&R) do you analyze the compromised device to find details like type of attack, severity, target, impact, method of propagation, and vulnerabilities exploited?
A) Preparation
B) Incident Recording and Assignment
C) Incident Triage
D) Notification
E) Containment
F) Evidence Gathering and Forensic Analysis
G) Eradication
H) Recovery
I) Post-Incident Activities
C
Which of these best describes step 3, Delivery, in the Cyber Kill Chain methodology?
A) An intruder creates malware to be used as a malicious attachment to an email.
B) An intruder sends a malicious attachment via email to a target.
C) An intruder’s malware is installed on a target’s machine.
D) An intruder’s malware is triggered when a target opens a malicious email attachment.
B
What is the process called that can record, log, and resolve events that happen in your company?
A) Metrics
B) Incident management process
C) Internal procedure
D) Security policy
B
Which best describes white-box testing?
A) The internal operation of a system is only partly accessible to the tester.
B) The internal operation of a system is completely known to the tester.
C) Only the internal operation of a system is known to the tester.
D) Only the external operation of a system is accessible to the tester.
B
Which of these laws was designed to improve the accuracy and accountability of corporate disclosures, and to protect the public from accounting errors and fraudulent activities?
A) SOX
B) HIPAA
C) FedRAMP
D) PCI DSS
A
Which phase of ethical hacking involves infecting a system with malware, and using phishing to gain access to a system or website?
A) Reconnaissance
B) Scanning
C) Gaining access
D) Maintaining access
C
You just got an e-mail from someone you’ve never met, claiming that your public website has a zero day vulnerability. The e-mail describes the problem and what you can do to protect yourself from this vulnerability. The e-mail has also been carbon-copied to Microsoft, informing them of the problem that their systems are exposed to. Which type of hacker sent you this e-mail?
A) Black hat
B) Red hat
C) Grey hat
D) White hat
C
Which best describes gray-box testing?
A) The internal operation of a system is only partly accessible to the tester.
B) The internal operation of a system is completely known to the tester.
C) Only the internal operation of a system is known to the tester.
D) Only the external operation of a system is accessible to the tester.
A
After finding and mitigating the vulnerabilities on your network, some small amount of risk still remains. What is this called?
A) Impact risk
B) Deferred risk
C) Residual risk
D) Inherent risk
C
Which type of hacker sometimes works offensively, and sometimes works defensively?
A) Suicide Hacker
B) Black Hat
C) Gray Hat
D) White Hat
C
Before a penetration tester can start any hacking activities, it’s most important for them to do which of these?
A) Creating action plan
B) Finding new exploits which can be used during the pentest.
C) Preparing a list of targeted systems.
D) Ensuring that her activity will be authorized and they will have proper agreement with owners of the targeted system.
D