AI Test Flashcards

1
Q

What is ethical hacking?

A

Ethical hacking is the practice of intentionally probing computer systems for vulnerabilities with the permission of the owner.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

True or False: Ethical hackers are also known as white hat hackers.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the primary goal of ethical hacking?

A

The primary goal of ethical hacking is to identify and fix security vulnerabilities before they can be exploited by malicious hackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Fill in the blank: Ethical hackers must obtain _____ before testing a system.

A

permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is penetration testing?

A

Penetration testing is a simulated cyber attack on a system to evaluate its security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is a common tool used by ethical hackers: a) Metasploit, b) Microsoft Word, c) Adobe Photoshop?

A

a) Metasploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does the acronym ‘CIA’ stand for in the context of information security?

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

True or False: Ethical hackers can perform their work without any legal ramifications.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the difference between a vulnerability assessment and a penetration test?

A

A vulnerability assessment identifies and classifies vulnerabilities, while a penetration test attempts to exploit those vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a zero-day exploit?

A

A zero-day exploit is a cyber attack that occurs on the same day a vulnerability is discovered, before a fix is available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Fill in the blank: Ethical hackers often use _____ to automate the process of scanning for vulnerabilities.

A

tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is social engineering in the context of ethical hacking?

A

Social engineering is the manipulation of individuals to gain confidential information or access to systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which term describes a hacker who breaks into systems for malicious purposes?

A

Black hat hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or False: Ethical hackers can also help organizations comply with regulations and standards.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a security policy?

A

A security policy is a formal document that outlines how an organization protects its physical and information technology assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does the term ‘footprinting’ refer to in ethical hacking?

A

Footprinting refers to gathering information about a target system to find ways to infiltrate it.

17
Q

Multiple Choice: Which of the following is NOT a phase of ethical hacking? a) Reconnaissance, b) Exploitation, c) Retaliation

A

c) Retaliation

18
Q

What is the purpose of a firewall?

A

A firewall is a network security device that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

19
Q

Fill in the blank: _____ testing involves assessing the security of an application by simulating an attack.

A

Application

20
Q

What is malware?

A

Malware is malicious software designed to harm, exploit, or otherwise compromise a computer system.

21
Q

True or False: Ethical hackers only work with private organizations.

22
Q

What is the purpose of a security audit?

A

A security audit evaluates an organization’s information system to determine its security posture.

23
Q

What does the term ‘patch management’ refer to?

A

Patch management refers to the process of managing updates for software applications and technologies.

24
Q

What is a DDoS attack?

A

A DDoS (Distributed Denial of Service) attack is an attempt to make a machine or network resource unavailable by overwhelming it with traffic.

25
Fill in the blank: Ethical hackers often document their findings in a _____ report.
penetration test
26
What does 'encryption' do?
Encryption converts data into a coded format that can only be read by someone with the appropriate decryption key.