暗記メーカー
ログイン
CYBERSECURITY ASSESSMENT
  • Pelegrino Jayrald

  • 問題数 55 • 11/16/2024

    記憶度

    完璧

    8

    覚えた

    21

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    Delete text messages that ask you to confirm or provide personal information: Legitimate companies don’t ask for information like your account numbers or passwords by email or text.

    SMISHING (SMS-PHISHING)

  • 2

    A file whose name ends in ___ is realy a program that when opened causes the operating system to run the program.

    .exe

  • 3

    Watch out for ____ clicking a malicious ad can expose your computer to malware

    Malvertising

  • 4

    Also knwon as “crackers” these hackers hack to gain unathorized acces to a system and harm its operations or steam sensitive information

    Black Hat Hackers

  • 5

    There are also known as “ethical hackers” they never intend to harm a system; rather they find out weaknesses in a computer or a network system as a part of penetration testing and vulnerability assessments

    White Hat Hackers

  • 6

    These are a blend of both black and white hackers, they act malicious intent; but for their fun, they exploit a security weakness in a computer system or network without the owner’s permission or knowledge.

    Gray Hat Hackers

  • 7

    A blend of both black and white hat hackers, they are usually on the level of hacking government agencies, top-secret information hubs, and generally anytjing the falls under the caregory of sensitive information.

    Red Hat Hackers

  • 8

    Is someone outside computer security consulting firms who are used to bug, test a system before its launch, they look for loopholes and microsoct uses the term.

    Blue Hat Hackers

  • 9

    Neophyte, noob, newbie or is someone who is new to hacking or phreaking and has almost no knowledge or experience of the working of technology and hacking.

    Green Hat Hackers

  • 10

    A social status among hackers,___ is used to describe the most skilled. Newly discover exploits circulate aming these hackers.

    Elite Hackers

  • 11

    Is a hacker who utilizes technology to announce a social, ideological, religious, or political message.

    Hacktivist

  • 12

    Is a non-expert who breaks into computer systems by using pre-packsge automated tools written by others usually with little understanding of the underlying concept, hence the term “kiddie”

    Script Kiddie

  • 13

    Is the process of recovering passwords from data that has been stored in or transmitted by a computer system.

    Password Cracking

  • 14

    Is an attack where a user session is taken over by an attacker. A session starts when you log into a service, for example your banking application, and ends when you log out.

    Session Hijacking

  • 15

    Is when someone or something pretends to be something else in an attempt to gain our confidence, get access to a system, steal data, or spread malware.

    Session Spoofing

  • 16

    Is a the process of monitoring and capturing all the packets passing through a given network using sniffing tools, allows you to see all sorts of traffic, both protectef and unprotected.

    Network Traffic Sniffing

  • 17

    Is an attack meant to shut down a machine or network, making it inaccesible to its intended users. ______ accomplish.

    Denial-of-Service (DoS) Attack

  • 18

    A buffer is a sequetial section of memory allocated to contain anything from a character string to an array of integers.

    Exploring Buffer Overflow Vulnerability

  • 19

    A cybercriminals exploit buffer overflow problems to alter the execution path of the application by overwriting parts of its memory.

    Executing a Buffer Overflow Attack

  • 20

    It is a software designed to force pre-chosen ads to display on a system.

    Adware

  • 21

    It is an action that is done on a system to get its access and extract sensitive data.

    Attack

  • 22

    Also known “Trap Door” this is a hidden entry to a computing device or software that bypasses security measures.

    Back Door

  • 23

    It is a program that automatrd an action so that it can be done repeatedly at a much higher rate for a more sustained period than a human operator could.

    Bot

  • 24

    It is an automated and simplest kind of method to gain access to a system or website.

    Brute Force Attack

  • 25

    This is a flaw that occurd when more data is written to a block of memory or buffer than the buffer is allocated to hold.

    Buffer Overflow

  • 26

    Is it the modification of an existing, legitimate email with a false link to trick the recipient into providing personal information.

    Clone Phising

  • 27

    S/He modifies the software to access the features which are considered undesirable by the person cracking the software.

    Cracker

  • 28

    It is a software system design to run on web servers to identify software vulnerabilities in client machines communicating.

    Exploit Kit

  • 29

    It is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability to compromise the security of a computer or network system

    Exploit

  • 30

    It is a filter designed to keep unwantef intruders outside a computer system or network while allowing safe communication between systems and users on the inside of the _____

    Firewall

  • 31

    This is the process if tracking the keys which are pressed on a computer (and white touchscreen points are used)

    Keystroke Logging

  • 32

    It is a virus secreted into a system that triggers a malicious action when certain condition are met.

    Logic Bomb

  • 33

    It is an umbrella term used to refer a variety of forms of hostile or intrusive software, including computer viruses, worms, trojan horses, ransomware, spyware, adware, scareware, and other malicious programs.

    Malware

  • 34

    This is the program a black hat hacker uses to transmit commands remotely to infected zombie drones, normally to carry out DoS attacks or spam attacks.

    Master Program

  • 35

    It is an e-email fraud method in which the perpetrator sends out legitimate-looking emails in an attempt to gather personal and financial information from recipents.

    Phishing

  • 36

    These are considered as the original computer hackers.

    Phreakers

  • 37

    This is a stealthy type of software, typically malicious, designed to hide the existence of certain process or programs.

    Rootkit

  • 38

    This is an act of exploiting holes in unpatched or poorly configured software,

    Shrink Wrap Code

  • 39

    This implies deceiving someone to acquire sensitive and personal information like credit card details or usernames and passwords.

    Social Engineering

  • 40

    It is simply an unsolicited email, also known ad “junk email”, sent to a large number if recipients without their consents.

    Spam

  • 41

    This is a software that aims to gather information about a person or organization without their knowledge.

    Spyware

  • 42

    This is an SQL code injection technique used for attacking data-driven applications, in which malicious SQL statementd are inserted.

    SQL Injection

  • 43

    It is a possible danger that can exploit an exisiting bug or vulnerability to compromise the security of a computer or network system.

    Threat

  • 44

    It is a malicious program disguised to look like a valid program.

    Trojan

  • 45

    It is a malicious program or a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting system or destroying data.

    Virus

  • 46

    This is a weakness that allows a hacker to compromise the security of a computer or network system.

    Vulnerability

  • 47

    It is a self-replicating virus that does not alter files but resides in active memory and duplicates itself.

    Worms

  • 48

    This is a type of computer security vulnerability typically found in web applications.

    Cross-site Scripting (XSS)

  • 49

    It is defined as a hi-jacked computer that is being used anonymously as a solider or “drone” for malicious activity.

    Zombie Drone

  • 50

    This is the phase where the attackers gathers information about a target using active or passive means.

    Reconnaissance

  • 51

    In this process, the attscker begins to probe a target machine or network actively for vulnerabilities that can be exploited.

    Scanning

  • 52

    In this process, the vulnerability is located.

    Gaining Access

  • 53

    This is the process where the hacker has already gained access to a system.

    Maintaining Access

  • 54

    This process is an unethical activity.

    Clearing Tracks

  • 55

    This is the last step in finishing the ethical hacking process.

    Reporting