Ethical Hacking

This class was created by Brainscape user Jarrod Pirino. Visit their profile to learn more about the creator.

Decks in this class (15)

Quiz 1
In which phase do you attempt to ...,
Which threat actor may cross ethi...,
Which team is a defensive securit...
15  cards
Chapter 1 Review Questions
What is enumeration in hacking 1,
Which threat actor may cross ethi...,
What is an advanced persistent th...
38  cards
Review 3
Which type of backup run daily an...,
Which of the following is not one...,
Which social engineering term ref...
15  cards
Review 4
Which of the following informatio...,
When a penetration tester starts ...,
Which of the following statements...
11  cards
Review 5
Which type of network scan scans ...,
According to testout __________ i...,
Which type of scan turns on all t...
25  cards
Review 6
Which tool mainly focuses on pre ...,
Which of the following statements...,
Which linux command provides info...
15  cards
Review 7
Which resource for ethical hacker...,
Which vulnerability assessment to...,
_____________ should be implement...
15  cards
Review 8
What term describes the method of...,
Which rootkit detection method wo...,
Which of the following tools clea...
15  cards
Review 9
Which malware detection method ai...,
Which malware related law defines...,
Which malware component is basica...
15  cards
Review 10
When securing network traffic whi...,
What mode does your network inter...,
What type of dos attack is also k...
15  cards
Review 11
What term describes a software pr...,
What term describes a software pr...,
What is the most effective firewa...
15  cards
Review 12
Which of the following web applic...,
When testing for sql injection vu...,
Which attack involves header resp...
15  cards
Review 13
Which of the following protocols ...,
Which of the following features d...,
Which of the following statements...
16  cards
Review 14
Which cloud security tool offers ...,
During which cloud computing atta...,
During which cloud computing atta...
15  cards
Review 15
What is an encryption tool that e...,
Which cryptographic method is one...,
Which type of encryption is usefu...
15  cards

More about
Ethical Hacking

  • Class purpose General learning

Learn faster with Brainscape on your web, iPhone, or Android device. Study Jarrod Pirino's Ethical Hacking flashcards now!

How studying works.

Brainscape's adaptive web mobile flashcards system will drill you on your weaknesses, using a pattern guaranteed to help you learn more in less time.

Add your own flashcards.

Either request "Edit" access from the author, or make a copy of the class to edit as your own. And you can always create a totally new class of your own too!

What's Brainscape anyway?

Brainscape is a digital flashcards platform where you can find, create, share, and study any subject on the planet.

We use an adaptive study algorithm that is proven to help you learn faster and remember longer....

Looking for something else?

Ethical Hacking
  • 10 decks
  • 374 flashcards
  • 987 learners
Decks: Quiz 1 2, Quiz 3, Quiz 4, And more!
COMPUTER NETWORKS
  • 23 decks
  • 463 flashcards
  • 134 learners
Decks: Introduction To Computer Networks, Types Of Networks, Networking Equipment, And more!
Make Flashcards