Theory Test 1 Flashcards

1
Q

Hacker

A

General term for anyone who uses a computer to gain unauthorized access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Elite Hacker (Cracker)

A

Extensive knowledge of computers, well experienced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Black Hat, White Hat, Grey Hat?

A

Black: illegal, malicious
White: ethical hacker, legal (contracted, security tester)
Grey: illegal-ish, non-malicious

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Script Kiddies

A

Not much knowledge, use programs from internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Noob

A

New to hacking, almost no knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hacker Goals and Motivation

A

Goal: Steal, stop access, extort, destroy
Motive: Challenge, revenge, vandalism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Who created worms and started “hacking”?

A

Robert Tappan Morris

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CIA

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Confidentiality

A

Messages cannot be read (encryption)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Integrity

A

Assurance that data is not altered (hashing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Availability

A

Network available to appropriate users (authentication)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AAA

A

Authentication, Authorization, and Accounting (systems)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

TCP

A

Transmission Control Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TCP/IP

A

Allows multiple apps to share same network connection and IP. Stack: 1. Network, 2. Internet, 3. Transport, 4. App

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

System and Registered Port Ranges

A

System: 0-1023
Registered: 1024-49151

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Port 20&21

A

File Transfer Protocol (FTP)

17
Q

Port 22

A

SSH, encrypted communication

18
Q

Port 23

A

Telnet, unencrypted communication

19
Q

Port 25

A

Simple Mail Transfer Protocol (SMTP)

20
Q

Port 53

21
Q

Port 80

A

HyperText Transfer Protocol (HTTP)

22
Q

Port 110

A

Post Office Protocol 3 (POP3)

23
Q

Port 143

A

Internet Message Access Protocol 4 (IMAP4)

24
Q

Port 443

A

SSL & TLS, HTTPS

25
Ports 139 and 445
File sharing ports. 139: NetBIOS, 445: AD, windows shares
26
6 Possible TCP Flags
SYN, ACK, PSH, URG, RST, FIN
27
UDP
User Data Protocol
28
ICMP
Internet Control Message Protocol
29
Types of DoS/DDoS Attacks
Syn flood, ping flood, smurf attack, fraggle, LAND
30
SYN Flood
DoS, SYN requests are spammed, exploits 3-way handshake, server can't accept new connections
31
Ping Flood
DoS, pings are spammed (ICMP echo requests), slows down computer. Command: ping __ -l (size in bytes) -t (continuous)
32
Smurf Attack
DDoS, send ping to broadcast address and spoof source, causing host to be flooded with ICMP echo replies
33
Fraggle Attack
DoS, send lots of spoofed UDP to router broadcast address
34
LAND Attack
Victim is sent packet with own IP in source and destination and same port for source and destination, causing continuous loop
35
Buffer Overflow Attack
Overflow a buffer with data that the extra data string could be passed to memory and run
36
SQL Injection Attack
Code injection technique, SQL statements are inserted into an entry field for execution
37
Netstat
Displays net connections for TCP and UDP protocols and network protocol statistics