MODULE 1: Intro to Ethical Hacking Flashcards

(93 cards)

1
Q

What is the assurance that information is accessible only to those authorized to have access?

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the trustworthiness of data or resources in terms of preventing improper and unauthorized changes?

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is assurance that the systems responsible for delivering, storing, and processing information are accessible when required by the authorized users?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What refers to the characteristic of a communication, document, or any data that ensures the quality of being genuine?

A

Authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the guarantee that the sender of a message cannot later deny having sent the message and that the recipient cannot deny having received the message?

A

Non-Repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What term refers to the use of information and communication technologies (ICT) to take competitive advantages over an opponent?

A

Information Warfare or InfoWar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of information warfare refers to all strategies and actions to defend against attacks on information and communication technologies assets?

A

Defensive Information Warfare

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of information warfare involves attacks against information and communication technologies assets of an opponent?

A

offensive information warfare

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What classification of attack does not tamper with data and involves intercepting and monitoring network traffic and data flow on the target network? (Ex: sniffing, eavesdropping)

A

Passive Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What classification of attack tampers with data in transit or disrupts communication or services between systems in order to bypass or break into secured systems? (Ex: DoS, MiTM, session hijacking, and SQL Injection)

A

Active Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What classification of attack is performed when the attacker is in close physical proximity with the target system or network in order to gather, modify, or disrupt access to information? (Ex: social engineering such as eavesdropping, shoulder surfing, and dumpster diving)

A

Close-In Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What classification of attack involves using privileged access to violate rules or intentionally cause a threat to the organization’s information or information systems? (Ex: theft of physical devices, planting keyloggers, backdoors, and malware)

A

Insider Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What classification of attack occurs when attackers tamper with hardware or software prior to installation such as at its source or while in transit between source and destination?

A

Distribution Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What methodology is a component of intelligence driven defense for the identification and prevention of malicious intrusion activities by understanding the adversary’s tactics, techniques, and procedures beforehand?

A

The Cyber Kill Chain Methodology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which step of the Cyber Kill Chain Methodology involves gathering data on the target to probe for weak points?

A

Reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which step of the Cyber Kill Chain Methodology involves creating a deliverable malicious payload using an exploit and a backdoor?

A

Weaponization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which step of the Cyber Kill Chain Methodology involves sending a weaponized bundle to the victim using email, USB, ect.?

A

Delivery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which step of the Cyber Kill Chain Methodology involves exploiting a vulnerability by executing code on the victim’s system?

A

Exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which step of the Cyber Kill Chain Methodology involves installing malware on the target system?

A

Installation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which step of the Cyber Kill Chain Methodology involves creating a command and control channel to communicate and pass data back and forth?

A

Command and Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which step of the Cyber Kill Chain Methodology involves performing actions to achieve intended objectives/goals?

A

Actions on Objective

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the guidelines that describe the way an attacker performs the attack from beginning to the end?
This includes initial exploitation, privilege escalation, and lateral movement.

A

Tactics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the technical methods used by an attacker to achieve intermediate results during the attack classified as?
This includes initial exploitation, setting up and maintaining command and control channels, accessing the target infrastructure, covering the tracks of data exfiltration, ect.?

A

Techniques

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the term that describes the organizational approaches that threat actors follow to launch an attack?

A

Procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What term describes the identification of the common methods or techniques followed by an adversary to launch attacks or penetrate an organization's network?
Adversary Behavioral identification
26
Which Adversary Behavior points to and adversary already being inside of a target network? Indicators include the enumeration of systems, hosts, and processes and the execution of various commands to extract information such as local user context, system config, hostname, IP, active remote systems, and processes running.
Internal Reconnaissance
27
Which Adversary Behavior can be identified by checking windows event logs or PowerShell transcript logs? Used by an adversary for automating data exfiltration and launching further attacks.
Use of PowerShell
28
Which Adversary Behavior includes the creation and configuration of multiple domains pointing to the same host allowing an adversary to switch quickly between domains to avoid detection?
Unspecified Proxy Activities
29
Which Adversary Behavior includes interacting with the target system, browsing files, reading file contents, modifying file content, creating new accounts, connecting to the remote system, and downloading and installing malicious code?
Use of Command Line Interface
30
Which Adversary Behavior includes modifying the contents of the HTTP user-agent field in order to communicate with the compromised system and execute attacks?
HTTP User Agent
31
Which Adversary Behavior includes using servers to communicate remotely with compromised systems through an encrypted session in order to steal data, delete data, and launch further attacks?
Command and Control (C2) Server
32
Which Adversary Behavior includes obfuscating malicious traffic in legitimate traffic carried by common protocols used in the network? Allows an adversary to communicate with the C2 server, bypass security controls, and perform data exfiltration.
DNS Tunneling
33
Which Adversary Behavior includes manipulating a web server by creating a shell within a website to gain remote access to the server and perform various tasks such as data exfiltration, file transfers, and file uploads?
Use of Web Shell
34
Which Adversary Behavior is described as collecting or destroying sensitive data?
Data Staging
35
What is the term for clues, artifacts, and pieces of forensic data found on the network or OS of an organization that indicates potential intrusion or malicious activity?
Indicators of Compromise
36
Which indicator of compromise category includes malicious data sent to a target organization or individual?
Email Indicator
37
Which indicator of compromise category indicates use of a command and control (c2) server, malware delivery, adversary identification of target operating systems, ect.?
Network Indicator
38
Which indicator of compromise category is found by performing an analysis of the infected system within the organizational network?
Host-Based Indicator
39
Which indicator of compromise identifies specific behavior related to malicious activities?
Behavioral indicators
40
What broad term refers to exploiting system vulnerabilities and compromising security controls to gain unauthorized or inappropriate access to a system’s resources?
Hacking
41
What class of hacker uses their computing skills for illegal or malicious purposes (criminal activities)?
Black Hats
42
What class of hacker uses their hacking skills for defensive purposes? Also known as Ethical Hackers/Penetration Testers.
White Hats
43
What class of hacker works both offensively and defensively at various times? Sometimes good, sometimes bad.
Gray Hat
44
What class of hacker hacks the government or corporations in order to increase awareness of their social or political agendas?
Hacktivist
45
What class of hacker aims to bring down critical infrastructure for a “cause” and are not worried about facing jail terms or any other kind of punishment?
Suicide Hackers
46
What class of hackers are unskilled and compromise systems by running scripts, tools, and software developed by real hackers?
Script Kiddies
47
What class of hacker is motivated by religious or political beliefs and have a goal to create fear by large scale disruption of computer networks?
Cyber Terrorists
48
What class of hacker is employed by the government to penetrate, gain top-secret information from, and damage the information systems of other governments?
State-Sponsored Hackers
49
What are the 5 hacking phases in order from start to finish?
1. Reconnaissance 2. Scanning / Enumeration 3. Gaining Access 4. Maintaining Access 5. Clearing tracks
50
Which phase of the 5 hacking phases refers to the preparatory phase where an attacker seeks to gather information about a target prior to launching an attack?
Reconnaissance
51
Which reconnaissance type involves acquiring information without directly interacting with the target?
Passive Reconnaissance
52
Which reconnaissance type involves interacting with the target directly by any means?
Active Reconnaissance
53
Which phase of the 5 hacking phases involves scanning the network for specific information on the basis of information gathered during the reconnaissance phase? Includes the use of dialers, port scanners, network mappers, ping tools, and vulnerability scanners in order to extract information such as live machines, open/closed ports, OS details, device type, system uptime, ect.
Scanning
54
Which phase of the 5 hacking phases includes obtaining access to the operating system or applications? During this phase an attacker can escalate privileges if need be. (Ex: password cracking, buffer overflows, denial of service, and session hijacking)
Gaining Access
55
Which phase of the 5 hacking phases refers to when an attacker tries to retain their ownership of the system? During this phase an attacker may prevent the system from being pwnd by other hackers by securing their access with backdoors, rootkits, or trojans.
Maintaining Access
56
Which phase of the 5 hacking phases involves the hacker attempting to hide their malicious acts?
Clearing Tracks
57
What is the term used for hacking in order to identify vulnerabilities, verify the existence of exploitable vulnerabilities, and perform security assessments of organizations with the permission of concerned authorities?
Ethical Hacking
58
What type of hackers are employed either through contracts or direct employment and must abide by a contract that specifies the scope/what is off limits? They must also sign an NDA and are only allowed to reveal vulnerabilities to the employer.
Ethical Hackers
59
What is the greatest asset of an organization?
Information
60
What term refers to the assurance that the integrity, availability, confidentiality, and authenticity of information is protected during usage, processing, storage, and transmission of information?
Information Assurance (IA)
61
What concept is a security strategy in which several protection layers are placed throughout an information system in order to prevent direct attacks?
Defense In Depth
62
What term refers to the degree of uncertainty or expectation that an adverse event may cause damage to the system?
Risk
63
What is used to scale risk by considering the probability, likelihood, and consequence or impact of the risk?
A Risk Matrix
64
What is the process of reducing and maintaining risk at an acceptable level by means of a well-defined and actively employed security program?
Risk Management
65
Which risk management phase identifies the sources, causes, consequences, and other details of the internal and external risks affecting the security of an organization?
Risk identification
66
Which risk management phase assesses the organization's risk and provides an estimate of the likelihood and impact of the risk?
Risk Assessment
67
Which risk management phase selects and implements appropriate controls for the identified risks?
Risk Treatment
68
Which risk management phase ensures appropriate controls are implemented to handle known risks and calculates the chances of a new risk occurring?
Risk Tracking
69
Which risk management phase evaluates the performance of the implemented risk management strategies?
Risk review
70
What is defined as the collection and analysis of information about threats while drawing patterns that allow you to respond effectively to cyber threats? This helps the organization identify and mitigate various business risks.
Cyber Threat Intelligence
71
What type of threat intelligence is consumed by high level executives and management and is basically high level information on changing risks?
Strategic
72
What type of threat intelligence provides information on attacker's TTPs and is consumed by IT service managers, SOC managers, and administrators?
Tactical
73
What type of threat intelligence provides information on a specific incoming attack and is consumed by security managers and network defenders?
Operational
74
What type of threat intelligence provides information on specific indicators of compromise and is consumed by SOC staff and Incidence Recovery teams?
Technical
75
What is a risk assessment approach for analyzing the security of an application by capturing, organizing, and analyzing all of the information that affects the security of an application?
Threat Modeling
76
What Threat Modeling Step helps to determine how much effort needs to be put towards subsequent steps?
1. Identify Security Objectives
77
What Threat Modeling Step identifies the components, data flows, and trust boundaries?
2. Application Overview
78
What Threat Modeling Step helps to find more relevant and more detailed threats?
3. Decompose the Application
79
What Threat Modeling Step helps identify threats relevant to the control scenario and context using the information obtained in steps 2 and 3?
4. Identify Threats
80
What Threat Modeling Step identifies weaknesses related to the threats found using vulnerability categories?
5. identify Vulnerabilities
81
What is a set of predefined processes to identify, analyze, prioritize, and resolve security incidents in order to restore normal service operations asap?
Incident Management
82
Placeholder for incident handling and response
no answer
83
What two assets are now vastly used across various industries due to the increase in computing power, data collection, and storage capabilities? These assets are unsupervised self-learning systems that are used to define what a normal network looks like and then backtrack and report any deviations or anomalies in real time.
Machine Learning and Artificial intelligence
84
What machine learning classification makes use of algorithms that input a set of labeled training data with the aim of learning the differences between labels?
Supervised Learning
85
What machine learning classification makes use of algorithms that input unlabeled training data with the aim of deducing categories by itself?
Unsupervised learning
86
What is a proprietary information security standard for organizations that handle cardholder information for the major debit, credit, prepaid, e-purse, ATM, and POS cards?
PCI-DSS
87
What law specifies the requirements for establishing, implementing, maintaining, and continually improving an information security management system within an organization?
ISO/IEC 27001:2013
88
What law provides federal protections for personal health information?
HIPAA
89
What Act is designed to protect investors and the public by increasing the accuracy and reliability of corporate disclosures?
Sarbanes Oxley Act (SOX)
90
What law is a US copyright law that defines legal prohibitions against circumvention of technological protection measures employed by copyright owners to protect their works?
The Digital Millennium Copyright Act (DMCA)
91
What Act provides a comprehensive framework for ensuring the effectiveness of information security controls over information resources that support federal operations and assets?
Federal Information Security Management Act (FISMA)
92
What regulation was put into effect in 2018 and is the most stringent privacy and security laws globally that is able to levy fines in the tens of millions of euros against violators?
General Data Protection Regulation (GDPR)
93
What Act sets out the framework for data protection laws in the UK?
Data Protection Act 2018 (DPA 2018)