Test Questions Flashcards
(47 cards)
What is an attack surface?
A area that can be hacked on a network
A hacker that uses premade tools to conduct attacks is known as which type of hacker?
Script kiddie
When you want to remain anonymous on the Internet, what manages the traffic flow?
TOR browsers (or onion network)
A hacker motived by personal beliefs is practicing what type of hacking?
Hacktivism
What is the team called that is hired or used to access the security of company?
Red Team
What is the name of the software that controls the communication between the VM and the physical host?
Hypervisor
A native or bare metal hypervisor does not communicate with which element(s) of the physical host?
operating system
What is the name of Microsoft’s software implementation of a hypervisor?
Hyper-V
Briefly describe VM sprawl.
When a business create virtual machines and forgets or ignores them.
To create an image of a VM in its current state, what would you do?
create a snapshot
skills that are necessary for communication are called ___.
soft skills
Which organization provides certifications such as Security+ and CySA+?
CompTIA
Microsoft offers MTA certification, which is an entry-level certification in a security fundamentals. What does MTA stand for?
Microsoft Technology Associate
Which certification is used by penetration testers as evidence of their knowledge of preventative hacking?
Certified Ethical Hacker (CEH)
Which security principle relates to protecting data against unauthorized chanes?
Integrity
What is the practice of having multiple layers of security to protect against intruders?
Defense in Depth
Briefly describe frameworks
Guidelines
Nontraditional computing devices with Internet access describes ___.
Internet of things (LOT)
What is the weakest link in an an organization’s policy and plan?
Users
What is a Trojan or Trojan horse?
Malware that hides inside a legitimate program.
Software that is preinstalled or embedded in hardware is known as ___.
firmware
Which type of cookie remains on the computer after the browser is closed until it reaches its expiration date?
persistent cookie
What is the social engineering technique in which the hacker lies to get information?
pretexting
If you are digging through a trash can for information, what is this hacking technique called?
dumpster diving