Ethical Hacking Midterm 1 - From the Slides

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/39

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

40 Terms

1
New cards

What is an Ethical Hacker?

Someone who is hired by companies to perform penetration tests

2
New cards

What is a penetration test?

An attempt to break into a company's network to find the weakest link

3
New cards

What is a security test?

This is more than a break-in attempt. It includes analyzing company's security policy and procedures. Vulnerabilities are reported.

4
New cards

What is an ethical hacker's role?

An ethical hacker's role is to perform most of the same activities as a hacker but with the owners permission.

5
New cards

What is a hackers role?

They access a computer system or network without authorization. They can go to prison.

6
New cards

What is a script kiddy or a packet monkey?

A younger, inexperienced hacker who copies codes from knowledgeable hackers.

7
New cards

What do experienced penetration testers use?

Programming Languages and Scripts

8
New cards

What is a tiger box?

A collection of tools used for conducting vulnerability assessments and attacks.

9
New cards

What is a white box model?

A tester is told about network topology and technology. The tester is permitted to interview IT personnel and company employees.

10
New cards

What is a Gray Box model?

Hybrid of the white and black box models. Company gives tester partial information such as operating systems but no network diagrams.

11
New cards

What's a minimum certification?

Security+ or equivalent

12
New cards

Who developed the Certified Ethical Hacker?

eecouncil, International Council of Electronic Commerce Consultants

13
New cards

What is the CISSP?

Certified Information Systems Security Professional? It tests security-related managerial skills.

14
New cards

What is GIAC?

Global Information Assurance Certification?

15
New cards

What is a danger of certification exams?

Memorization

16
New cards

What is CHIP?

Computer Hacking and Intellectual Property. It is a new government ranch to address computer hacking and intellectual property crimes.

17
New cards

What are some illegal actions?

Accessing a computer without permission, destroying data without permission, copying information without permission, install worms or viruses, denying users access to network resources

18
New cards

Skills needed to become an ethical hacker

Knowledge of network and computer technology, Ability to communicate with management and IT personnel, an understanding of the laws in your location, and ability to use necessary tools

19
New cards

1970

Homebrew computer club created blue boxes to hack into phone systems

20
New cards

What is a security Tester?

Breaks in and analyzes company's security policy and procedures. Vulnerabilities are reported.

21
New cards

Is Port Scanning Legal

Federal Government does not see it as a violation--Allows each state to address it separately.

22
New cards

TCP/IP Stack

NITA - Network, Internet, Transport, and Application

23
New cards

What are the two components of IP addresses

Network and Host Address

24
New cards

What is the range for class A IP's?

1 -126

25
New cards

What is the range for Class B IP's?

128-191

26
New cards

What is the range for class c?

... 192-223

27
New cards

How many possible ports are there?

65535

28
New cards

What is the TCP three-way handshake?

SYN, SYN-ACK, ACK

29
New cards

What port is SMTP

Port 25

30
New cards

What port is FTP

Port 20, 21

31
New cards

What port is SSH

22

32
New cards

What port for DNS

53

33
New cards

What port is HTTP?

80

34
New cards

What port POP3

110

35
New cards

What port is RPC

135

36
New cards

What port for netbios and file share

139

37
New cards

LDAP port

389

38
New cards

RDP Port

3389

39
New cards

What port MySQL DB server

3306

40
New cards

What port is SMB

445