1/11
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
What is Hacking?
Hacking is the act of exploring, modifying, or exploiting computer systems, networks, or applications.
What is the primary goal of hacking?
The primary goal of hacking is to gain unauthorized access to information or services.
What distinguishes a Red Team from a Blue Team in cybersecurity?
A Red Team simulates attackers to find vulnerabilities, while a Blue Team protects systems against attacks.
What is the function of a Purple Team?
A Purple Team collaborates the efforts of Red and Blue Teams for better security practices.
Define Vulnerability in the context of cybersecurity.
A vulnerability is a weakness in a system that presents risks but is not inherently bad.
What is an Exploit?
An exploit is when someone actively takes advantage of a vulnerability.
What is Enumeration?
Enumeration is the systematic discovery of devices and configurations, often a first step in penetration testing.
What is Social Engineering?
Social Engineering involves hacking people instead of technology, usually through deception.
List two examples of Social Engineering techniques.
Phishing and impersonation.
What is Malware?
Malware is malicious software designed to disrupt, damage, or steal data.
What do Monitoring Tools do?
Monitoring tools observe networks, systems, and applications for unusual activity.
What type of information can Monitoring Tools provide?
They can provide logs, reports, and alerts related to network and application activities.