HACKER TECHNIQUES

HACKING TECHNIQUES

36 cards   |   Total Attempts: 188
  

Cards In This Set

Front Back
Which of the following represents a valid ethical hacking test methodology? A. HIPAA B. RFC 1087 C. OSSTMM D. TCSEC
D. TCSEC
It is most important to obtain ________ before beginning a penetration test.
PERMISSION
A security exposure in an operating system or application software component is caled a _____.
VULNERABILITY
The second step of the hacking process is _____.
SCANNING
When hackers talk about standards of behavior and moral issues of right and wrong, what are they referring to? A. Rules B. Standards C. Laws D. Ethics
D. ETHICS
Hackers may justify their actions based on which of the following: A. All informatin should be free B. Access to computers and their data should be unlimited C. Writing viruses, malware, or other code is not a crime D. Any of the above
D. ANY OF THE ABOVE
This individual responsible for releasing what is considered to be the first Internet worm was: A. Kevin Mitnik B. Robert T. Morris, Jr. C.Adrian lamo D.kevin Poulsen
B. ROBERT T. MORRIS
A hacker with computer skills and expertise to launch harmful attacks on computer networks and uses those skills illegally is best described as a(n): A. Disgruntled employee B. Ethical hacker C. White hat hacker D. Black hat hacker
D. BLACK HAT HACKER
If a penetration test team does not have anything more than a list of IP addresses of the organizaation's network, what type of test are the penetration testers conducting? A. Blind assessment B. White box C. Gray box D. Black box
D. BLACK BOX
How is the practice of tricking employees into revealing sensitive data about their computer system or infrastructure best described? A. Ethcal hacking B. Dictionary attack C. Trojan horse D. Social engineering
D. SOCIAL ENGINEERING
ASSET
Something of value that needs to be protected. In the IT realm, this can be data, software, or hardware.
AUTHENTICATION
The process of confirming that someone is who he or she claims to be, as with a username and password.
BLACK-BOX TESTING
A kind of testing of a computer system in which the testing team must approach it like a "black box," with no prior knowledge of it.
CRACKER
Someone who breaks into computer systems without authorization.
DENIAL OF SERVICE (DoS)
An attack in which a service is overwhelmed by traffic preventing or denying its legitimate use.