AI Test Flashcards
What is ethical hacking?
Ethical hacking is the practice of intentionally probing computer systems for vulnerabilities with the permission of the owner.
True or False: Ethical hackers are also known as white hat hackers.
True
What is the primary goal of ethical hacking?
The primary goal of ethical hacking is to identify and fix security vulnerabilities before they can be exploited by malicious hackers.
Fill in the blank: Ethical hackers must obtain _____ before testing a system.
permission
What is penetration testing?
Penetration testing is a simulated cyber attack on a system to evaluate its security.
Which of the following is a common tool used by ethical hackers: a) Metasploit, b) Microsoft Word, c) Adobe Photoshop?
a) Metasploit
What does the acronym ‘CIA’ stand for in the context of information security?
Confidentiality, Integrity, Availability
True or False: Ethical hackers can perform their work without any legal ramifications.
False
What is the difference between a vulnerability assessment and a penetration test?
A vulnerability assessment identifies and classifies vulnerabilities, while a penetration test attempts to exploit those vulnerabilities.
What is a zero-day exploit?
A zero-day exploit is a cyber attack that occurs on the same day a vulnerability is discovered, before a fix is available.
Fill in the blank: Ethical hackers often use _____ to automate the process of scanning for vulnerabilities.
tools
What is social engineering in the context of ethical hacking?
Social engineering is the manipulation of individuals to gain confidential information or access to systems.
Which term describes a hacker who breaks into systems for malicious purposes?
Black hat hacker
True or False: Ethical hackers can also help organizations comply with regulations and standards.
True
What is a security policy?
A security policy is a formal document that outlines how an organization protects its physical and information technology assets.
What does the term ‘footprinting’ refer to in ethical hacking?
Footprinting refers to gathering information about a target system to find ways to infiltrate it.
Multiple Choice: Which of the following is NOT a phase of ethical hacking? a) Reconnaissance, b) Exploitation, c) Retaliation
c) Retaliation
What is the purpose of a firewall?
A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.
Fill in the blank: _____ testing involves assessing the security of an application by simulating an attack.
Application
What is malware?
Malware is malicious software designed to harm, exploit, or otherwise compromise a computer system.
True or False: Ethical hackers only work with private organizations.
False
What is the purpose of a security audit?
A security audit evaluates an organization’s information system to determine its security posture.
What does the term ‘patch management’ refer to?
Patch management refers to the process of managing updates for software applications and technologies.
What is a DDoS attack?
A DDoS (Distributed Denial of Service) attack is an attempt to make a machine or network resource unavailable by overwhelming it with traffic.