100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Module 1 - Introduciton to Ethical Hacking Test Questions and Correct Answers

Rating
-
Sold
-
Pages
12
Grade
A+
Uploaded on
24-09-2024
Written in
2024/2025

Information Security A state of well-being of information and infrastructure in which the possibility of THEFT, TAMPERING and DISRUPTION OF INFORMATION AND SERVICES is low or tolerable Elements of Information Security (EIS) (Confidentiality -> Integrity - > Availability) -> Authenticity -> Non-repudiation Confidentiality (EIS) Assurance tha the information is accessible only to those AUTHORIZED TO HAVE ACCESS Integrity (EIS) The TRUSTWORTHINESS OF DATA OR RESOURCES in terms of preventing improper or unauthorized changes. Hashing algorithms fall in this category Availibility (EIS) Assurance that the systems responsible for delivering, storing, and processing information are accessible when REQUIRED BY THE AUTHORIZED USERS Authenticity (EIS) Refers to teh characteristic of a communication, document, or any data that ensures the QUALITY OF BEING GENUINE Digital signatures fall in this category. Non-Repudiation A GUARANTEE that the sender of a message cannot later deny having sent the message and that the recipient cannot deny having received the message Attacks Motive(Goal) + Method + Vulnerability Motive The TARGET SYSTEM STORES OR PROCESSES something valuable, and this leads to the threat of an attack on the system How do hackers hack? They try various tools and attack techniques to EXPLOIT VULNERABILITIES in a computer system or its security policy and controls in order to fulfill their motives 1. Passive Attacks (Classification of Attacks) - Do not tamper with the data and involve intercepting and MONITORING NETWORK TRAFFICE and data flow on the target network -Examples include sniffing and eavesdropping

Show more Read less
Institution
Ethical Hacking
Course
Ethical Hacking









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Ethical Hacking
Course
Ethical Hacking

Document information

Uploaded on
September 24, 2024
Number of pages
12
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Module 1 - Introduciton to Ethical
Hacking Test Questions and Correct
Answers
Information Security ✅A state of well-being of information and infrastructure in which
the possibility of THEFT, TAMPERING and DISRUPTION OF INFORMATION AND
SERVICES is low or tolerable

Elements of Information Security (EIS) ✅(Confidentiality -> Integrity - > Availability) ->
Authenticity -> Non-repudiation

Confidentiality (EIS) ✅Assurance tha the information is accessible only to those
AUTHORIZED TO HAVE ACCESS

Integrity (EIS) ✅The TRUSTWORTHINESS OF DATA OR RESOURCES in terms of
preventing improper or unauthorized changes. Hashing algorithms fall in this category

Availibility (EIS) ✅Assurance that the systems responsible for delivering, storing, and
processing information are accessible when REQUIRED BY THE AUTHORIZED
USERS

Authenticity (EIS) ✅Refers to teh characteristic of a communication, document, or any
data that ensures the QUALITY OF BEING GENUINE
Digital signatures fall in this category.

Non-Repudiation ✅A GUARANTEE that the sender of a message cannot later deny
having sent the message and that the recipient cannot deny having received the
message

Attacks ✅Motive(Goal) + Method + Vulnerability

Motive ✅The TARGET SYSTEM STORES OR PROCESSES something valuable, and
this leads to the threat of an attack on the system

How do hackers hack? ✅They try various tools and attack techniques to EXPLOIT
VULNERABILITIES in a computer system or its security policy and controls in order to
fulfill their motives

1. Passive Attacks (Classification of Attacks) ✅- Do not tamper with the data and
involve intercepting and MONITORING NETWORK TRAFFICE and data flow on the
target network
-Examples include sniffing and eavesdropping

, 2. Active Attacks (Classification of Attacks) ✅- Tamper with data in transit or DISRUPT
THE COMMUNICATION or services between the systems to bypass or break into
secured systems
-Examples include DoS, Man in the Middle, session hijacking, and SQL injection

3. Close-in Attacks (Classification of Attacks) ✅-Performed when the attacker is in
close physical proximity with the target system or network in order to gather, modify, or
DISRUPT ACCESS to information
-Examples include social engineering such as eavesdropping, shoulder surfing, and
dumpster diving

4. Insider Attacks (Classification of Attacks) ✅-Using privileged access to VIOLATE
RULES or intentionally cause a threat to the organization's information or information
systems
-Examples include theft of physical devices and planting keyloggers, backdoors, and
malware

5. Distribution Attacks ✅-Attackers tamper with hardware or software prior to
installation
-Attackers tamper with hardware or software at its source or in transit

Information Warfare ✅Use of information and communication technologies (ICT) to
gain competitive advantages over an opponent

Defensive Information Warfare (PREPDAD) ✅Refers to all strategies adn actions
designed to defend against attacks on ICT assets
Prevention, Deterrence, Alerts, Detection, Emergency Preparedness, and Response

Offensive Information Warfare (SWWMM) ✅Refers to information warfare that invovles
attacks against the ICT assets of an opponent
Web application attacks, web server attacks, malware attacks, MITM attacks, system
hacking

Cyber Kill Chain Methodology ✅Component of intelligence-driven defense for the
identification and PREVENTION of MALICIOUS INTRUSION ACTIVITIES

Cyber Kill Chain Insights ✅Provides insights into attack phases, which helps security
professionals to understand the adversary's tactics, techniques, and procedures
beforehand

Cyber Kill Chain (CKC) (7 Steps) WACRIDE ✅Reconnaissance -> Weaponization ->
Delivery -> Exploitation -> Installation -> Command and Control -> Actions on
Objectives

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
twishfrancis Kaplan University
View profile
Follow You need to be logged in order to follow users or courses
Sold
200
Member since
2 year
Number of followers
42
Documents
10607
Last sold
4 weeks ago
SmartStudy Hub

Discover top-quality study materials at SmartStudy Hub. From concise summaries to exam guides, I offer resources designed to boost your grades. Trust in my expertise and elevate your academic performance today! NB: I do assignments too. Struggling to meet your academic deadlines? I've got you covered! I'll ensure papers are delivered on time, each time. Don't let deadlines stress you out- let's work together to achieve your academic goals! WELCOME!!!

Read more Read less
4.0

38 reviews

5
22
4
6
3
4
2
0
1
6

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions