hacking penn midterm

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/148

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 7:45 PM on 3/9/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

149 Terms

1
New cards

Risk Management

The process of identifying, analyzing, and responding to security risks

2
New cards

Risk Management Options

Accept risk, transfer risk, remove risk, or mitigate risk

3
New cards

Accept Risk

Choosing to tolerate a risk because mitigation costs more than the potential loss

4
New cards

Transfer Risk

Shifting risk to another entity such as through insurance or contracts

5
New cards

Remove Risk

Eliminating the system component or feature that introduces the risk

6
New cards

Mitigate Risk

Reducing risk through countermeasures or security controls

7
New cards
8
New cards

Asset Value (AV)

The total value of an asset being protected

9
New cards

Exposure Factor (EF)

Percentage of asset loss caused by a specific threat

10
New cards

Single Loss Expectancy (SLE)

Expected monetary loss from a single occurrence of a threat

11
New cards

SLE Formula

SLE = Asset Value × Exposure Factor

12
New cards

Annualized Rate of Occurrence (ARO)

Estimated frequency that a threat occurs within one year

13
New cards

Annualized Loss Expectancy (ALE)

Expected yearly loss from a threat

14
New cards

ALE Formula

ALE = SLE × ARO

15
New cards

Purpose of ALE

Determine if the cost of a security control is justified

16
New cards

Example ALE Calculation

If SLE = $250,000 and ARO = 0.05 then ALE = $12,500 per year

17
New cards
18
New cards

Threat

A potential event that could exploit a vulnerability

19
New cards

Vulnerability

A weakness in hardware, software, or configuration

20
New cards

Attack

An attempt to exploit a vulnerability

21
New cards

Risk

Probability that a threat will exploit a vulnerability and cause damage

22
New cards

Risk Formula

((Threat × Vulnerability) / Countermeasures) × Value

23
New cards

Countermeasure

A security control used to reduce risk

24
New cards
25
New cards

Reconnaissance

Gathering information about a target before an attack

26
New cards

Purpose of Reconnaissance

Identify technologies, systems, and vulnerabilities

27
New cards

Enumeration

Actively interacting with systems to gather detailed information

28
New cards

Difference Between Reconnaissance and Enumeration

Reconnaissance is passive while enumeration involves active interaction with systems

29
New cards
30
New cards

Footprinting

Collecting publicly available information about a target organization

31
New cards

Footprinting Sources

Websites, job postings, employee information, partner companies

32
New cards

Purpose of Footprinting

Identify technologies and possible attack surfaces

33
New cards

Footprinting Countermeasure

Remove or sanitize sensitive public information

34
New cards
35
New cards

Ethical Hacking

Security testing performed with permission

36
New cards

Penetration Testing

A structured process used to identify vulnerabilities

37
New cards

Purpose of Penetration Testing

Identify weaknesses before attackers exploit them

38
New cards

Penetration Tests Often Part Of

IT security audits

39
New cards
40
New cards

CIA Triad

Confidentiality, Integrity, Availability

41
New cards

Confidentiality

Ensuring information is accessible only to authorized users

42
New cards

Integrity

Ensuring data is accurate and not altered

43
New cards

Availability

Ensuring systems and data are accessible when needed

44
New cards
45
New cards

TCP/IP Port Numbers

Numerical identifiers used to identify application services

46
New cards

HTTP Port

80

47
New cards

Purpose of Port Numbers

Identify which application-layer protocol uses a transport service

48
New cards
49
New cards

IP Address

Unique numerical identifier assigned to a device on a network

50
New cards

IPv4 Address Length

32 bits

51
New cards

Dotted Quad Notation

Standard IPv4 format such as 148.100.100.4

52
New cards

Loopback Address

127.0.0.1 used by a host to refer to itself

53
New cards
54
New cards

DNS (Domain Name System)

System that translates domain names into IP addresses

55
New cards

Purpose of DNS

Allow humans to use readable names instead of IP addresses

56
New cards

DNS Resolution

Process of converting a domain name into an IP address

57
New cards
58
New cards

Domain Name

Human readable name used to identify internet resources

59
New cards

Top-Level Domain (TLD)

Last part of a domain name such as .com .org .edu

60
New cards

Domain Registrar

Company that sells and manages domain registrations

61
New cards
62
New cards

dnslookup

Command used to query DNS records

63
New cards

Purpose of dnslookup

Retrieve IP address and DNS information for a domain

64
New cards

whois

Command used to retrieve domain ownership information

65
New cards
66
New cards

ARIN (American Registry for Internet Numbers)

Organization responsible for allocating IP address blocks in North America

67
New cards

Purpose of Regional Internet Registries

Manage distribution and registration of public IP addresses

68
New cards
69
New cards

Address Resolution Protocol (ARP)

Protocol used to map IP addresses to MAC addresses on a LAN

70
New cards

ARP Broadcast

Broadcast asking which device owns an IP address

71
New cards

ARP Cache

Local table storing previously resolved IP to MAC mappings

72
New cards

arp Command

Command used to display ARP cache

73
New cards
74
New cards

DNS Cache Poisoning

Attack where false DNS information is inserted into a resolver cache

75
New cards

Impact of DNS Cache Poisoning

Users may be redirected to malicious websites

76
New cards

DNS Denial of Service Attack

Flooding DNS servers so they cannot respond to queries

77
New cards

Botnet

Group of compromised computers controlled by an attacker

78
New cards

DNS Amplification Attack

Small DNS queries generate large responses to overwhelm a victim

79
New cards
80
New cards

DNS Security Improvements

Randomized requests, restricted resolvers, replicated servers, DNSSEC

81
New cards

Randomized DNS Requests

Unpredictable port numbers and IDs used to prevent spoofing

82
New cards

Restricted DNS Resolvers

Only authorized users can query the resolver

83
New cards

Replicated DNS Servers

Multiple servers ensure availability if one fails

84
New cards

DNSSEC

Provides authentication and integrity for DNS responses

85
New cards
86
New cards

Split DNS

Separate internal and external DNS records

87
New cards

Purpose of Split DNS

Prevent exposure of internal network information

88
New cards

External DNS Contains

Public server information

89
New cards

Internal DNS Contains

Internal system information

90
New cards
91
New cards

Encryption

Process of converting plaintext into ciphertext

92
New cards

Plaintext

Readable original data

93
New cards

Ciphertext

Encrypted unreadable data

94
New cards

Decryption

Process of converting ciphertext back into plaintext

95
New cards
96
New cards

Cryptography

The practice of securing communication through encryption

97
New cards

Key

A value used in cryptographic algorithms

98
New cards

Kerckhoff’s Principle

Security should rely on secrecy of the key rather than secrecy of the algorithm

99
New cards
100
New cards

Symmetric Encryption

Encryption using a single shared key

Explore top notes

note
Chapter 19- Ammonia
Updated 1283d ago
0.0(0)
note
SAT Vocabulary
Updated 702d ago
0.0(0)
note
unit 5 vocab
Updated 381d ago
0.0(0)
note
DNA Damage
Updated 1323d ago
0.0(0)
note
Arthritis Pain of the Elbow
Updated 1142d ago
0.0(0)
note
Chapter 19- Ammonia
Updated 1283d ago
0.0(0)
note
SAT Vocabulary
Updated 702d ago
0.0(0)
note
unit 5 vocab
Updated 381d ago
0.0(0)
note
DNA Damage
Updated 1323d ago
0.0(0)
note
Arthritis Pain of the Elbow
Updated 1142d ago
0.0(0)