Ethical Hacking Flashcards
(56 cards)
What operating systems are typically used in everyday computers?
Windows, macOS, Linux.
Why do security professionals prefer Kali Linux?
It comes pre-installed with over 600 penetration testing tools and is customizable.
What is the GUI in an operating system?
Graphical User Interface — user-friendly environment using Windows, Icons, Menus, and Pointers (W.I.M.P).
What is the Command Line Interface (CLI)?
A text-based interface for executing commands, preferred by security professionals for more control and faster navigation.
How do you add a user in Linux through CLI?
Use the adduser [username] command and set a password using passwd [username].
What command shows the current user in Linux?
whoami
What command changes the current directory in Linux?
cd [directory_name]
What is the Linux file system structure called?
Hierarchical tree with root / at the top.
How do you change file permissions in Linux?
Use the chmod command with symbolic or numeric values.
Why recruit ethical hackers?
To prevent breaches, uncover vulnerabilities, strengthen security, protect data, and raise awareness.
What 3 questions does an ethical hacker seek to answer during evaluation?
1) What can an attacker see? 2) What can they do with it? 3) Are their attempts being noticed?
What is footprinting?
Gathering public data to identify risks, map networks, and find entry points.
What are the two types of footprinting?
Passive and Active.
What types of organizational info can be found through footprinting?
Employee details, addresses, partners, web links, background, news, patents.
What types of network info are gathered in footprinting?
Domains, subdomains, network blocks, IPs, trusted routers, DNS records.
Name 3 Google search operators useful for footprinting.
site:, allinurl:, inurl:, allintitle:, intitle:, inanchor:, cache:, link:, filetype:.
What is the Google Hacking Database?
A categorized list of known Google search queries that locate sensitive data.
What tools can be used to gather information from IoT and job sites?
Google Earth, Archive.org, theHarvester.
What are cyber-dependent crimes?
Crimes that can only happen via ICT devices, like hacking or DDoS attacks.
What are cyber-enabled crimes?
Traditional crimes made easier through technology, like fraud and cyberstalking.
Give two examples of cyber-dependent crimes.
Hacking networks, launching malware attacks.
Give two examples of cyber-enabled crimes.
Online fraud, cyberbullying.
What is malware?
Malicious software designed to disrupt or gain unauthorized access to systems.
What is the difference between a virus and a worm?
Viruses need a host file and user action; worms spread autonomously.