記憶度
8問
21問
0問
0問
0問
アカウント登録して、解答結果を保存しよう
問題一覧
1
Delete text messages that ask you to confirm or provide personal information: Legitimate companies don’t ask for information like your account numbers or passwords by email or text.
SMISHING (SMS-PHISHING)
2
A file whose name ends in ___ is realy a program that when opened causes the operating system to run the program.
.exe
3
Watch out for ____ clicking a malicious ad can expose your computer to malware
Malvertising
4
Also knwon as “crackers” these hackers hack to gain unathorized acces to a system and harm its operations or steam sensitive information
Black Hat Hackers
5
There are also known as “ethical hackers” they never intend to harm a system; rather they find out weaknesses in a computer or a network system as a part of penetration testing and vulnerability assessments
White Hat Hackers
6
These are a blend of both black and white hackers, they act malicious intent; but for their fun, they exploit a security weakness in a computer system or network without the owner’s permission or knowledge.
Gray Hat Hackers
7
A blend of both black and white hat hackers, they are usually on the level of hacking government agencies, top-secret information hubs, and generally anytjing the falls under the caregory of sensitive information.
Red Hat Hackers
8
Is someone outside computer security consulting firms who are used to bug, test a system before its launch, they look for loopholes and microsoct uses the term.
Blue Hat Hackers
9
Neophyte, noob, newbie or is someone who is new to hacking or phreaking and has almost no knowledge or experience of the working of technology and hacking.
Green Hat Hackers
10
A social status among hackers,___ is used to describe the most skilled. Newly discover exploits circulate aming these hackers.
Elite Hackers
11
Is a hacker who utilizes technology to announce a social, ideological, religious, or political message.
Hacktivist
12
Is a non-expert who breaks into computer systems by using pre-packsge automated tools written by others usually with little understanding of the underlying concept, hence the term “kiddie”
Script Kiddie
13
Is the process of recovering passwords from data that has been stored in or transmitted by a computer system.
Password Cracking
14
Is an attack where a user session is taken over by an attacker. A session starts when you log into a service, for example your banking application, and ends when you log out.
Session Hijacking
15
Is when someone or something pretends to be something else in an attempt to gain our confidence, get access to a system, steal data, or spread malware.
Session Spoofing
16
Is a the process of monitoring and capturing all the packets passing through a given network using sniffing tools, allows you to see all sorts of traffic, both protectef and unprotected.
Network Traffic Sniffing
17
Is an attack meant to shut down a machine or network, making it inaccesible to its intended users. ______ accomplish.
Denial-of-Service (DoS) Attack
18
A buffer is a sequetial section of memory allocated to contain anything from a character string to an array of integers.
Exploring Buffer Overflow Vulnerability
19
A cybercriminals exploit buffer overflow problems to alter the execution path of the application by overwriting parts of its memory.
Executing a Buffer Overflow Attack
20
It is a software designed to force pre-chosen ads to display on a system.
Adware
21
It is an action that is done on a system to get its access and extract sensitive data.
Attack
22
Also known “Trap Door” this is a hidden entry to a computing device or software that bypasses security measures.
Back Door
23
It is a program that automatrd an action so that it can be done repeatedly at a much higher rate for a more sustained period than a human operator could.
Bot
24
It is an automated and simplest kind of method to gain access to a system or website.
Brute Force Attack
25
This is a flaw that occurd when more data is written to a block of memory or buffer than the buffer is allocated to hold.
Buffer Overflow
26
Is it the modification of an existing, legitimate email with a false link to trick the recipient into providing personal information.
Clone Phising
27
S/He modifies the software to access the features which are considered undesirable by the person cracking the software.
Cracker
28
It is a software system design to run on web servers to identify software vulnerabilities in client machines communicating.
Exploit Kit
29
It is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to compromise the security of a computer or network system
Exploit
30
It is a filter designed to keep unwantef intruders outside a computer system or network while allowing safe communication between systems and users on the inside of the _____
Firewall
31
This is the process if tracking the keys which are pressed on a computer (and white touchscreen points are used)
Keystroke Logging
32
It is a virus secreted into a system that triggers a malicious action when certain condition are met.
Logic Bomb
33
It is an umbrella term used to refer a variety of forms of hostile or intrusive software, including computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs.
Malware
34
This is the program a black hat hacker uses to transmit commands remotely to infected zombie drones, normally to carry out DoS attacks or spam attacks.
Master Program
35
It is an e-email fraud method in which the perpetrator sends out legitimate-looking emails in an attempt to gather personal and financial information from recipents.
Phishing
36
These are considered as the original computer hackers.
Phreakers
37
This is a stealthy type of software, typically malicious, designed to hide the existence of certain process or programs.
Rootkit
38
This is an act of exploiting holes in unpatched or poorly configured software,
Shrink Wrap Code
39
This implies deceiving someone to acquire sensitive and personal information like credit card details or usernames and passwords.
Social Engineering
40
It is simply an unsolicited email, also known ad “junk email”, sent to a large number if recipients without their consents.
Spam
41
This is a software that aims to gather information about a person or organization without their knowledge.
Spyware
42
This is an SQL code injection technique used for attacking data-driven applications, in which malicious SQL statementd are inserted.
SQL Injection
43
It is a possible danger that can exploit an exisiting bug or vulnerability to compromise the security of a computer or network system.
Threat
44
It is a malicious program disguised to look like a valid program.
Trojan
45
It is a malicious program or a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting system or destroying data.
Virus
46
This is a weakness that allows a hacker to compromise the security of a computer or network system.
Vulnerability
47
It is a self-replicating virus that does not alter files but resides in active memory and duplicates itself.
Worms
48
This is a type of computer security vulnerability typically found in web applications.
Cross-site Scripting (XSS)
49
It is defined as a hi-jacked computer that is being used anonymously as a solider or “drone” for malicious activity.
Zombie Drone
50
This is the phase where the attackers gathers information about a target using active or passive means.
Reconnaissance
51
In this process, the attscker begins to probe a target machine or network actively for vulnerabilities that can be exploited.
Scanning
52
In this process, the vulnerability is located.
Gaining Access
53
This is the process where the hacker has already gained access to a system.
Maintaining Access
54
This process is an unethical activity.
Clearing Tracks
55
This is the last step in finishing the ethical hacking process.
Reporting