INTRODUCTION TO CYBERSECURITY QUESTIONS AND ANSWERS#5
Attack vector - correct answer avenue or path a hacker uses to commit the attack
Black-hat hacker - correct answer operates outside the law (bad)
Cyberattack - correct answer attempts to steal, damage or destroy data or computer system
Cybersecurity - correct answer process of protecting a system against unintended or malicious
changes or use
Darknet - correct answer - part of the internet that is not easily accessible to the average user
- represents the underground of the internet
Deepweb - correct answer includes resources not found within a typical search engine
Gray-hat hacker - correct answer does no harm, but doesn't ask for permission (neutral)
Hacking - correct answer act of circumventing or breaking past security boundaries
Hacktivism - correct answer - aim is to target and harm companies or individuals with whom
they have a fundamental disagreement
- hacking in an effort to convey a social or political message
Onion network - correct answer - connection involves data being rerouted through many
computers before you are delivered to your destination
- a technique for anonymous communication over a computer network
Phreaking - correct answer hacking into a phone system
, Script kiddie - correct answer slang term used to describe an individual who uses premade tools
to perform their attacks
Tor browser - correct answer - gives access to the anonymous websites on the darknet
- stands for "The Onion Router" browser
Virus - correct answer malicious software code that is unleashed and attempts to perform its
destructive content
White-hat hacker - correct answer ethical and law-abiding (good)
Worm - correct answer standalone malware computer program that replicates itself in order to
spread to other computers
Application cell - correct answer each individual machine
Container - correct answer each individual machine
Host operating system - correct answer operating system located on the physical machine
Hyper -v - correct answer virtualization platform developed by microsoft for its servers and
desktops
Hypervisor - correct answer specific software that handles the responsibilities of running a
virtual machine
Provisioning - correct answer ability to quickly deploy resources when needed
Attack vector - correct answer avenue or path a hacker uses to commit the attack
Black-hat hacker - correct answer operates outside the law (bad)
Cyberattack - correct answer attempts to steal, damage or destroy data or computer system
Cybersecurity - correct answer process of protecting a system against unintended or malicious
changes or use
Darknet - correct answer - part of the internet that is not easily accessible to the average user
- represents the underground of the internet
Deepweb - correct answer includes resources not found within a typical search engine
Gray-hat hacker - correct answer does no harm, but doesn't ask for permission (neutral)
Hacking - correct answer act of circumventing or breaking past security boundaries
Hacktivism - correct answer - aim is to target and harm companies or individuals with whom
they have a fundamental disagreement
- hacking in an effort to convey a social or political message
Onion network - correct answer - connection involves data being rerouted through many
computers before you are delivered to your destination
- a technique for anonymous communication over a computer network
Phreaking - correct answer hacking into a phone system
, Script kiddie - correct answer slang term used to describe an individual who uses premade tools
to perform their attacks
Tor browser - correct answer - gives access to the anonymous websites on the darknet
- stands for "The Onion Router" browser
Virus - correct answer malicious software code that is unleashed and attempts to perform its
destructive content
White-hat hacker - correct answer ethical and law-abiding (good)
Worm - correct answer standalone malware computer program that replicates itself in order to
spread to other computers
Application cell - correct answer each individual machine
Container - correct answer each individual machine
Host operating system - correct answer operating system located on the physical machine
Hyper -v - correct answer virtualization platform developed by microsoft for its servers and
desktops
Hypervisor - correct answer specific software that handles the responsibilities of running a
virtual machine
Provisioning - correct answer ability to quickly deploy resources when needed