Hacking Flashcards

(29 cards)

1
Q

Cybercriminal (Black Hat)

A

A hacker who violates computer security for personal gain.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Social Engineering

A

Tricking people into breaking normal security rules and procedures and/or divulging personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Trojan

A

A malicious program that pretends to be benign/normal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The word “malware” comes from the term?

A

Malicious Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Phishing

A

Sending a fake email that looks like it’s from a real company, to fool people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hactivist

A

Subversive use of computer systems to promote a political/social agenda.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Asymmetric encryption

A

Uses a key-pair, a public key and a private key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which type of attack does not require human assitance?

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Zero-day exploit

A

Taking advantage of a software vulnerability on the day it is discovered, before the developers can patch it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which form is for Biometrics

A

It is a known and registered physical attribute of a user specifically used for verifying their identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ransomware

A

A virus that encrypts your files then demands payment to decrypt them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Malicious Insider

A

A hacker who uses their access to harm their employer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DDOS

A

A malicious attempt to make an internet/network server unavailable to legitimate users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Pharming

A

Having users directed to a fake website instead of a genuine website, to fool them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is cyber security?

A

the practice of protecting systems, networks, and programs from digital attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which backup strategy includes only the files and software that have changed since the last full backup?

17
Q

Certified Ethical Hacker (White Hat)

A

An expert hacker who uses abilities for good, ethical, legal purposes.

18
Q

Hacker

A

Is a person who breaks into computers, usually by gaining access to administrative controls.

19
Q

Virus

A

A malicious file that can attach to other files and replicate when the user shares the file.

20
Q

Which of these is regularly used to secure online communication?

A

Public-key encryption

21
Q

Static heuristic

A

Decompile and look for source code, and compare against heuristic database of existing, known viruses.

22
Q

Dynamic heuristic

A

Lets the program run in a controlled situation (sandbox) while antivirus observes actions.

Strange actions e.g. deleting files and duplicating, quarantines the program.

23
Q

Physical security

A

Fire detection and supression systems, CCTV, locks, biometrics, and ensuring that the hardware is in a safe location.

24
Q

Encryption

A

Converting data into an illegible, scrambled format so it cannot be understood by unauthorsised parties. Uses an encryption algorithm and a unique key.

Key needed to convert other format back to plaintext

25
Audit trails
Improve accountability by keeping track of who made what changes (and when) during development.
26
Blagging
Creating and using an invented scenario to engage a targeted victim in divulging personal info.
27
Acceptable Use Policy
A collection of rules and procedures that employees are required to follow in order to protect their organisation’s systems and networks.
28
Quid pro quo
QPP means “something for something”. Provides a benefit in exchange for information. e.g You won an iPad!
29
Baiting
The promise of cash or goods that people with malicious intent use to entice victims e.g. offering free music or movie downloads to trick users into revealing their login credentials.