Ethical Hacking Flashcards

(56 cards)

1
Q

What operating systems are typically used in everyday computers?

A

Windows, macOS, Linux.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why do security professionals prefer Kali Linux?

A

It comes pre-installed with over 600 penetration testing tools and is customizable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the GUI in an operating system?

A

Graphical User Interface — user-friendly environment using Windows, Icons, Menus, and Pointers (W.I.M.P).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the Command Line Interface (CLI)?

A

A text-based interface for executing commands, preferred by security professionals for more control and faster navigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How do you add a user in Linux through CLI?

A

Use the adduser [username] command and set a password using passwd [username].

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What command shows the current user in Linux?

A

whoami

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What command changes the current directory in Linux?

A

cd [directory_name]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the Linux file system structure called?

A

Hierarchical tree with root / at the top.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How do you change file permissions in Linux?

A

Use the chmod command with symbolic or numeric values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why recruit ethical hackers?

A

To prevent breaches, uncover vulnerabilities, strengthen security, protect data, and raise awareness.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What 3 questions does an ethical hacker seek to answer during evaluation?

A

1) What can an attacker see? 2) What can they do with it? 3) Are their attempts being noticed?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is footprinting?

A

Gathering public data to identify risks, map networks, and find entry points.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the two types of footprinting?

A

Passive and Active.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What types of organizational info can be found through footprinting?

A

Employee details, addresses, partners, web links, background, news, patents.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What types of network info are gathered in footprinting?

A

Domains, subdomains, network blocks, IPs, trusted routers, DNS records.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Name 3 Google search operators useful for footprinting.

A

site:, allinurl:, inurl:, allintitle:, intitle:, inanchor:, cache:, link:, filetype:.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the Google Hacking Database?

A

A categorized list of known Google search queries that locate sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What tools can be used to gather information from IoT and job sites?

A

Google Earth, Archive.org, theHarvester.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are cyber-dependent crimes?

A

Crimes that can only happen via ICT devices, like hacking or DDoS attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are cyber-enabled crimes?

A

Traditional crimes made easier through technology, like fraud and cyberstalking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Give two examples of cyber-dependent crimes.

A

Hacking networks, launching malware attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Give two examples of cyber-enabled crimes.

A

Online fraud, cyberbullying.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is malware?

A

Malicious software designed to disrupt or gain unauthorized access to systems.

24
Q

What is the difference between a virus and a worm?

A

Viruses need a host file and user action; worms spread autonomously.

25
What is spyware?
Software that secretly gathers user information and sends it to third parties.
26
What is ransomware?
Malware that encrypts data and demands payment for its release.
27
What is the purpose of a botnet?
Control infected computers remotely to perform coordinated attacks.
28
What is the Computer Misuse Act 1990?
UK law against unauthorized access and damage to computer systems.
29
What is Section 1 of the CMA about?
Unauthorized access to computer material.
30
What does Section 3ZA of CMA cover?
Acts causing serious damage to welfare, the environment, or national security.
31
Why is scanning used?
To find vulnerable communication channels and identify entry points.
32
Name 3 types of scanning.
Port scanning, Network scanning, Vulnerability scanning.
33
What is the TCP 3-way handshake?
SYN -> SYN-ACK -> ACK sequence to establish a TCP connection.
34
What is Nmap used for?
Network exploration and security auditing.
35
What is Hping3?
A command-line tool for packet crafting and network scanning.
36
What is Metasploit?
An open-source framework for penetration testing and security assessment.
37
What is host discovery?
Identifying live systems on a network before scanning them further.
38
What is enumeration?
Extracting detailed info about systems like usernames, shares, and services.
39
Name 2 enumeration techniques.
Extract usernames via email IDs, brute force Active Directory.
40
What is a vulnerability?
A flaw that can be exploited to bypass security measures.
41
What causes vulnerabilities?
Misconfigured hardware/software, poor design, user carelessness.
42
What is vulnerability research?
Studying protocols and configurations to find security flaws.
43
Why do ethical hackers research vulnerabilities?
To identify design flaws, monitor exploits, and stay updated.
44
Name two vulnerability research resources.
Exploit Database, Packet Storm.
45
What is a vulnerability assessment?
Evaluating systems to detect security weaknesses.
46
Name two types of vulnerability scanning.
Active scanning and Passive scanning.
47
What is Nessus Essentials?
A free vulnerability scanner with powerful scanning and reporting tools.
48
What is a password hash?
A scrambled version of a password stored by systems for security.
49
Name two hashing algorithms.
MD5, SHA (SHA-1, SHA-2, SHA-3).
50
Where are Windows passwords stored?
In the SAM file located at C:\Windows\System32\Config\SAM.
51
What is NTLM authentication?
A Windows authentication method using challenge-response and hashes.
52
What is a brute-force attack?
Trying every possible password until the correct one is found.
53
What is a rainbow table attack?
Using precomputed tables of hashes to crack passwords faster.
54
What is privilege escalation?
Gaining higher permissions than initially authorized.
55
What are two types of privilege escalation?
Horizontal and Vertical.
56
Name two exploit databases.
Exploit-DB, VulDB.