Theory Test 1 Flashcards

1
Q

Hacker

A

General term for anyone who uses a computer to gain unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Elite Hacker (Cracker)

A

Extensive knowledge of computers, well experienced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Black Hat, White Hat, Grey Hat?

A

Black: illegal, malicious
White: ethical hacker, legal (contracted, security tester)
Grey: illegal-ish, non-malicious

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Script Kiddies

A

Not much knowledge, use programs from internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Noob

A

New to hacking, almost no knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hacker Goals and Motivation

A

Goal: Steal, stop access, extort, destroy
Motive: Challenge, revenge, vandalism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Who created worms and started “hacking”?

A

Robert Tappan Morris

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CIA

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Confidentiality

A

Messages cannot be read (encryption)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Integrity

A

Assurance that data is not altered (hashing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Availability

A

Network available to appropriate users (authentication)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AAA

A

Authentication, Authorization, and Accounting (systems)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TCP

A

Transmission Control Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TCP/IP

A

Allows multiple apps to share same network connection and IP. Stack: 1. Network, 2. Internet, 3. Transport, 4. App

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

System and Registered Port Ranges

A

System: 0-1023
Registered: 1024-49151

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Port 20&21

A

File Transfer Protocol (FTP)

17
Q

Port 22

A

SSH, encrypted communication

18
Q

Port 23

A

Telnet, unencrypted communication

19
Q

Port 25

A

Simple Mail Transfer Protocol (SMTP)

20
Q

Port 53

A

DNS

21
Q

Port 80

A

HyperText Transfer Protocol (HTTP)

22
Q

Port 110

A

Post Office Protocol 3 (POP3)

23
Q

Port 143

A

Internet Message Access Protocol 4 (IMAP4)

24
Q

Port 443

A

SSL & TLS, HTTPS

25
Q

Ports 139 and 445

A

File sharing ports. 139: NetBIOS, 445: AD, windows shares

26
Q

6 Possible TCP Flags

A

SYN, ACK, PSH, URG, RST, FIN

27
Q

UDP

A

User Data Protocol

28
Q

ICMP

A

Internet Control Message Protocol

29
Q

Types of DoS/DDoS Attacks

A

Syn flood, ping flood, smurf attack, fraggle, LAND

30
Q

SYN Flood

A

DoS, SYN requests are spammed, exploits 3-way handshake, server can’t accept new connections

31
Q

Ping Flood

A

DoS, pings are spammed (ICMP echo requests), slows down computer. Command: ping __ -l (size in bytes) -t (continuous)

32
Q

Smurf Attack

A

DDoS, send ping to broadcast address and spoof source, causing host to be flooded with ICMP echo replies

33
Q

Fraggle Attack

A

DoS, send lots of spoofed UDP to router broadcast address

34
Q

LAND Attack

A

Victim is sent packet with own IP in source and destination and same port for source and destination, causing continuous loop

35
Q

Buffer Overflow Attack

A

Overflow a buffer with data that the extra data string could be passed to memory and run

36
Q

SQL Injection Attack

A

Code injection technique, SQL statements are inserted into an entry field for execution

37
Q

Netstat

A

Displays net connections for TCP and UDP protocols and network protocol statistics