Test Questions Flashcards
What is an attack surface?
A area that can be hacked on a network
A hacker that uses premade tools to conduct attacks is known as which type of hacker?
Script kiddie
When you want to remain anonymous on the Internet, what manages the traffic flow?
TOR browsers (or onion network)
A hacker motived by personal beliefs is practicing what type of hacking?
Hacktivism
What is the team called that is hired or used to access the security of company?
Red Team
What is the name of the software that controls the communication between the VM and the physical host?
Hypervisor
A native or bare metal hypervisor does not communicate with which element(s) of the physical host?
operating system
What is the name of Microsoft’s software implementation of a hypervisor?
Hyper-V
Briefly describe VM sprawl.
When a business create virtual machines and forgets or ignores them.
To create an image of a VM in its current state, what would you do?
create a snapshot
skills that are necessary for communication are called ___.
soft skills
Which organization provides certifications such as Security+ and CySA+?
CompTIA
Microsoft offers MTA certification, which is an entry-level certification in a security fundamentals. What does MTA stand for?
Microsoft Technology Associate
Which certification is used by penetration testers as evidence of their knowledge of preventative hacking?
Certified Ethical Hacker (CEH)
Which security principle relates to protecting data against unauthorized chanes?
Integrity
What is the practice of having multiple layers of security to protect against intruders?
Defense in Depth
Briefly describe frameworks
Guidelines
Nontraditional computing devices with Internet access describes ___.
Internet of things (LOT)