Introduction to Ethical Hacking Flashcards

1
Q

What is Eavesdropping?

A

Snooping on the communication between users or devices in order to record private information to launch passive attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Session Hijacking?

A

An attack whereby an active session of the user is intercepted and stolen by an attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Spoofing?

A

The process of fooling the target device or user by tampering the original message/request and pretending to be trusted origin.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Privilege Escalation?

A

The process of leveraging OS or application’s bug, design flaw or misconfiguration in order to obtain elevated access to resources you otherwise wouldn’t be able to access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Psychological Warfare?

A

Psychological warfare is the use of various techniques such as propaganda and terror to demoralize one’s adversary in an attempt to succeed in battle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Hacker Warfare?

A

Hacker warfare can vary from the shutdown of systems, data errors, theft of information, theft of services, system monitoring, false messaging, and access to data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is C2 (Command and Control) Warfare?

A

C2 warfare refers to the impact an attacker possesses over a compromised system or network that they control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Electronic Warfare?

A

Electronic warfare uses radio-electronic and cryptographic techniques to degrade the communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Economic Warfare?

A

Economic warfare affects the economy of a business or nation by blocking the flow of information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Intelligence-based Warfare?

A

Intelligence-based warfare is a sensor-based technology that directly corrupts technological systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the five elements of Information Security?

A

Confidentiality, Integrity, Availability, Authenticity and Non-Repudiation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is Confidentiality defined as?

A

Assurance that the information is accessible only to those authorized to have access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Integrity defined as?

A

The trustworthiness of data or resources in terms of preventing improper or unauthorized changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Availability defined as?

A

Assurance that the systems responsible for delivering, storing, and processing information are accessible when required by the authorized users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Authenticity defined as?

A

Refers to the characteristic of a communication, document, or any data that ensures the quality of being genuine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Non-Repudiation defined as?

A

A guarantee that the sender of a message cannot later deny having sent the message and that the recipient cannot deny having received the messag

17
Q

What is an Insider Attack?

A

Insider attacks involve using privileged access to violate rules or intentionally cause a threat to the organization’s information or information systems

Examples include theft of physical devices and planting keyloggers, backdoors, and malware

18
Q

What is a Distribution Attack?

A

Distribution attacks occur when attackers tamper with hardware or software prior to installation Attackers tamper with the hardware or software at its source or in transit

Attackers tamper with the hardware or software at its source or in transit

19
Q

What is a Passive Attack?

A

Passive attacks do not tamper with the data and involve intercepting and monitoring network traffic and data flow on the target network

Examples include sniffing and eavesdropping

20
Q

What is an Active Attack?

A

Active attacks tamper with the data in transit or disrupt the communication or services between the systems to bypass or break into secured systems

Examples include DoS, Man-in-the-Middle, session hijacking, and SQL injection

21
Q

What is a Close-in Attack?

A

Close-in attacks are performed when the attacker is in close physical proximity with the target system or network in order to gather, modify, or disrupt access to information

Examples include social engineering such as eavesdropping, shoulder surfing, and dumpster diving

22
Q

What is Cyberwarfare?

A

ibicki defines cyber warfare as the use of information systems against the virtual personas of individuals or groups. It is the broadest of all information warfare. It includes information terrorism, semantic attacks (similar to Hacker warfare, but instead of harming a system, it takes over the system while maintaining the perception that it is operating correctly), and simula-warfare (simulated war, for example, acquiring weapons for mere demonstration rather than actual use)

23
Q

What is Operational Threat Intelligence?

A

It provides contextual information about security events and incidents that help defenders disclose potential risks, provide greater insight into attacker methodologies, identify past malicious activities, and perform investigations on malicious activities in a more efficient way

24
Q

What is Strategic Threat Intelligence?

A

Strategic Threat Intelligence provides high-level information regarding cybersecurity posture, threats, details about the financial impact of various cyber activities, attack trends, and the impact of high-level business decisions

25
Q

What is Technical Threat Intelligence?

A

Technical Threat Intelligence provides rapid distribution and response to threats. For example, a piece of malware used to perform an attack is tactical threat intelligence, whereas the details related to the specific implementation of the malware come under technical threat intelligence.

26
Q

What is Tactical Threat Intelligence?

A

Tactical Threat Intelligence plays a major role in protected the resources of the organization. It provides information related to the TTPs (Techniques, Tactics, and Procedures) used by threat actors (attackers) to perform attacks

27
Q

What are the 4 steps of risk management (in order)?

A

Risk Identification -> Risk Assessment -> Risk Treatment -> Risk Tracking and Review

28
Q

What are the 5 steps of Threat Modeling (in order)?

A

Identify Security Objectives -> Application Overview -> Decompose the Application -> Identify Threats -> Identify Vulnerabilities

29
Q

What is Threat Modeling?

A

Threat modeling is a risk assessment approach for analyzing the security of an application by capturing, organizing, and analyzing all the information that affects it. The threat model consists of three major building blocks: understanding the adversary’s perspective, characterizing the security of the system, and determining threats

30
Q

What is Information Assurance?

A

Information Assurance refers to the assurance of the integrity, availability, confidentiality, and authenticity of information and information systems during the usage, processing, storage, and transmission of information. Security experts accomplish information assurance with the help of physical, technical, and administrative controls

31
Q

What is Incident Management?

A

Incident management is a set of defined processes to identify, analyze, prioritize, and resolve security incidents to restore the system to normal service operations as soon as possible, and prevent recurrence of the incident

32
Q

What is Defense-in-depth?

A

Defense-in-depth is a security strategy in which security professionals use several protection layers throughout an information system. This strategy uses the military principle that it is more difficult for an enemy to defeat a complex and multi-layered defense system than to penetrate a single barrier. Defense-in-depth helps to prevent direct attacks against an information system and its data because a break in one layer only leads the attacker to the next layer

33
Q

What are some preventative infosec processes?

A

Patch Management, Vulnerability Management, and IDS Deployment.

34
Q

What are some reactive infosec processes?

A

Incident Handling, Forensics and Disaster Recovery

35
Q

Which country has the Lanham (Trademark) Act?

A

The United States

36
Q

Which country has the Copyright, Etc. and Trademarks (Offenses And Enforcement) Act 2002?

A

UK

37
Q

Which country has The Patents (Amendment) Act, 1999, Trade Marks Act, 1999, The Copyright Act, 1957?

A

India