Terminology Flashcards

Learn definitions to various Ethical Hacking Terminology.

1
Q

What are White Hats?

A

Good Guys, ethical hackers who use their skills for defensive purposes

They put their mind into the mind of a Black hat to defend against them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What defines Gray Hats?

A

Self-proclaimed ethical hackers whose actions can be good or bad depending on the situation

They are typically interested in hacker tools from a curiosity standpoint.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who are Black Hats?

A

Bad guys or malicious attackers who use their skills for illegal or malicious purposes

They are often compared to the Sith.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the four basic elements of security?

A
  • Confidentiality
  • Authenticity
  • Integrity
  • Availability
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a confidentiality attack?

A

Stealing passwords or other data that allows unauthorized access

This compromises the confidentiality of information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is an authenticity attack?

A

MAC address spoofing that allows unauthorized devices to connect to a network

This is particularly relevant in wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What constitutes an integrity attack?

A

Bit-flipping attacks where data may be tampered with in transit

This affects the reliability of the data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an availability attack?

A

Denial-of-service (DoS) attack that overloads a system so it can’t be accessed

This targets the availability of systems and networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Define ‘Threat’ in cybersecurity terms.

A

A situation that could lead to a potential breach of security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an ‘Exploit’?

A

A piece of software or technology that takes advantage of a bug or vulnerability

This leads to unauthorized access of a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does ‘Vulnerability’ mean?

A

The existence of a software flaw or error that can lead to undesirable events

This can execute damaging instructions to the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Target of Evaluation (TOE)?

A

A system, program, or network that is the subject of a security analysis or attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Remote exploit?

A

An exploit sent over a network without prior access to the vulnerable system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Local exploit?

A

An exploit delivered directly to a computer system requiring prior access

This is used to increase privileges.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What happens during an attack?

A

A system is compromised based on vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Virus/Trojan?

A

A virus embedded in something downloaded or installed.

17
Q

What is Phishing?

A

Replicating websites to capture login credentials.

18
Q

Define Eavesdropping.

A

Monitoring someone without their knowledge.

19
Q

What is a Fake WAP?

A

A fake Wi-Fi network designed to access your data.

20
Q

What are Waterhole Attacks?

A

Attacks targeting locations with higher traffic.

21
Q

What is DDoSing?

A

Flooding traffic to crash a site

This is a type of Denial of Service attack.

22
Q

What does a Keylogger do?

A

Tracks keystrokes on a device.

23
Q

Define Social Engineering.

A

Psychological manipulation to obtain confidential information.

24
Q

What is Bait & Switch?

A

Fake ads leading to a page with a virus.

25
What is Cookie Theft?
Taking cookies off a computer to impersonate the user.
26
What is Cybersecurity?
The act of ensuring a network and its information is safe.
27
What are examples of Cybersecurity measures?
* Using a Firewall * Requiring strong passwords * Installing Antivirus Software
28
What is Ethical Hacking?
Attempting to break into a network legally to uncover vulnerabilities.
29
What is the focus of Cybersecurity?
Protecting a network from potential attacks and dangers.
30
What does Ethical Hacking test?
A network's defenses against potential attacks.
31
Are Ethical Hacking and Penetration Testing interchangeable?
True.
32
What is White Box Hacking?
Ethical hacking with full knowledge of systems being tested.
33
What is Gray Box Hacking?
Ethical hacking with some information about the network but not full details.
34
What is Black Box Hacking?
Ethical hacking with no information about the target.
35
What is Internal Penetration Testing?
Simulating an attack from within the network.
36
What is External Penetration Testing?
Testing the ability for hackers to break into a network from outside.
37
What is Web Application Penetration Testing?
Exploiting vulnerabilities in a web application or website.