Security + Penetration Testing Flashcards

1
Q

Penetration testing

A

a simulated cyber attack against your computer system to check for exploitable vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Black-hat hacking

A

a computer hacker who violates laws or ethical standards for nefarious purposes, such as cybercrime, cyberwarfare, or malice. These acts can range from piracy to identity theft. A Black hat is often referred to as a “cracker”.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

White-box testing

A

*a form of application testing * that provides the tester with complete knowledge of the application being tested, including access to source code and design documents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Black-box testing

A

a method of software testing that *examines the functionality of an application *without peering into its internal structures or workings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

****White-hat hacking

A

white hat hacker – or ethical hacker – is an individual who uses hacking skills to identify security vulnerabilities in hardware, software or networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

grey-hat hacking

A

enact a blend of both black hat and white hat activities. Gray hat hackers often look for vulnerabilities in a system without the owner’s permission or knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

grey-box hacking

A

refers to the testing of software where there is some limited knowledge of its internal workings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

War chalking

A

occurs when people draw symbols in areas to indicate the presence of an open Wi-Fi network. The symbols used typically say something about the access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

War driving

A

the act of looking for publicly accessible Wi-Fi networks

, usually from a moving vehicle, using a laptop or smartphone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Insider threat

A

the threat that an insider will use their authorized access, wittingly or unwittingly, to do harm to the department

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

white team

A

In cybersecurity exercises, the role of an event overseer (i.e. the referee)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Reconnaissance

A

the first phase of a penetration testing engagement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly