Final exam ITN 261 ( modules vocabulary )

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/93

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

94 Terms

1
New cards

What is the CIA Triad?

Confidentiality, Integrity, and Availability—core principles of cybersecurity.

2
New cards

What is the Cyber Kill Chain?

A model describing stages of a cyberattack.

3
New cards

What is MITRE ATT&CK?

A framework for classifying adversary tactics and techniques.

4
New cards

What is Ethical Hacking?

Authorized testing of systems to find vulnerabilities.

5
New cards

What is Risk Management?

The process of identifying, assessing, and mitigating risks.

6
New cards

What is Information Assurance?

Protection of systems ensuring availability, integrity, authentication, confidentiality, and non-repudiation.

7
New cards

What is Incident Management?

Steps taken to handle and resolve security incidents.

8
New cards

What is Footprinting?

Gathering information about a target.

9
New cards

What is OSINT?

Open Source Intelligence—public data gathering for reconnaissance.

10
New cards

What is a Whois Lookup?

Identifying domain registration data.

11
New cards

What is DNS Footprinting?

Extracting DNS records.

12
New cards

What is Website Mirroring?

Downloading a full copy of a website.

13
New cards

What is Email Header Analysis?

Inspecting email headers to trace the sender.

14
New cards

What is Social Engineering?

Manipulating people to reveal confidential information.

15
New cards

What is a Ping Sweep?

ICMP scans to discover live hosts.

16
New cards

What is Port Scanning?

Discovering open ports and services.

17
New cards

What is Nmap?

A powerful network scanning tool.

18
New cards

What is Firewall Evasion?

Techniques used to bypass firewalls.

19
New cards

What are Proxies?

Tools to mask origin IP addresses.

20
New cards

What is NetBIOS Enumeration?

Extracting Windows networking information.

21
New cards

What is SNMP Enumeration?

Gathering system details from SNMP-enabled devices.

22
New cards

What is LDAP?

A protocol used to access directory services.

23
New cards

What is Directory Traversal?

Exploring directories and file paths on web servers.

24
New cards

What is a Vulnerability Scanner?

Tool to identify system weaknesses (e.g., OpenVAS).

25
New cards

What is CVE?

Common Vulnerabilities and Exposures—public list of known vulnerabilities.

26
New cards

What is Privilege Escalation?

Gaining higher access on a system.

27
New cards

What is a Buffer Overflow?

Exploit where excess data corrupts memory.

28
New cards

What is Metasploit?

Framework for developing and executing exploits.

29
New cards

What is Meterpreter?

Metasploit payload for post-exploitation.

30
New cards

What is Netcat?

Tool for network communication and backdoors.

31
New cards

What is Pass-the-Hash?

Attack using password hash without decrypting it.

32
New cards

What is Hashcat?

Password recovery tool using GPU acceleration.

33
New cards

What is a Trojan Horse?

Malware disguised as legitimate software.

34
New cards

What is a Rootkit?

Malware designed to hide its presence.

35
New cards

What is an APT?

Advanced Persistent Threat—a long-term, targeted cyberattack.

36
New cards

What is Static Analysis?

Analyzing code without executing it.

37
New cards

What is Packet Sniffing?

Intercepting network traffic (e.g., Wireshark).

38
New cards

What is ARP Poisoning?

Redirecting traffic using spoofed ARP messages.

39
New cards

What is a MITM attack?

Attacker secretly relays or alters communication.

40
New cards

What is Phishing?

Tricking users into revealing sensitive info via fake messages.

41
New cards

What is Impersonation?

Pretending to be someone else to gain trust.

42
New cards

What is an Insider Threat?

Risk posed by individuals within the organization.

43
New cards

What is a DoS/DDoS Attack?

Overwhelming a system with traffic to make it unavailable.

44
New cards

What is a TCP SYN Flood?

DoS method using SYN packets to exhaust resources.

45
New cards

What is a BotNet?

Network of zombified devices used in DDoS attacks.

46
New cards

What is a Session Token?

Unique identifier for a user session.

47
New cards

What is XSS?

Injecting malicious scripts into web pages.

48
New cards

What is CSRF?

Tricking users into executing unwanted actions.

49
New cards

What is an IDS?

Intrusion Detection System—monitors traffic for suspicious activity.

50
New cards

What is Snort?

Open-source IDS.

51
New cards

What is a Honeypot?

Decoy system to detect attackers.

52
New cards

What is a Web Application Firewall?

Firewall that protects application layer resources.

53
New cards

What is Web Defacement?

Unauthorized alteration of a website’s appearance.

54
New cards

What is the OWASP Top 10?

List of top web application security risks.

55
New cards

What is SQL Injection?

Inserting SQL commands into input fields.

56
New cards

What is Command Injection?

Injecting OS commands.

57
New cards

What is Clickjacking?

Tricking users into clicking something hidden.

58
New cards

What is XXE?

XML External Entity injection attack.

59
New cards

What is IDOR?

Insecure Direct Object Reference vulnerability.

60
New cards

What is Burp Suite?

Web vulnerability scanner and proxy tool.

61
New cards

What is Blind SQLi?

SQL injection where inference is used instead of direct feedback.

62
New cards

What is SQLmap?

Tool for automating SQL injection detection and exploitation.

63
New cards

What is WPA3?

Most recent and secure Wi-Fi encryption standard.

64
New cards

What is WPS?

Vulnerable Wi-Fi Protected Setup protocol.

65
New cards

What is Flipper Zero?

Multi-tool for wireless and hardware hacking.

66
New cards

What is Jailbreaking?

Removing restrictions on iOS to gain root access.

67
New cards

What is Rooting?

Removing restrictions on Android devices.

68
New cards

What is MDM?

Mobile Device Management—admin control over mobile devices.

69
New cards

What is IoT?

Internet of Things, often insecure and unpatched.

70
New cards

What is OT?

Operational Technology—used in industrial controls like SCADA.

71
New cards

What is Shodan?

Search engine for internet-connected devices.

72
New cards

What are IaaS, PaaS, SaaS?

Different cloud service models.

73
New cards

What is an S3 Bucket?

Cloud storage service which can be misconfigured.

74
New cards

What is the Shared Responsibility Model?

Defines security obligations for providers and users.

75
New cards

What is Symmetric Encryption?

Encryption using one key for encryption and decryption.

76
New cards

What is Asymmetric Encryption?

Encryption using a public/private key pair.

77
New cards

What is PKI?

Public Key Infrastructure—framework for managing digital keys.

78
New cards

What is a Hash Function?

One-way encryption for integrity (e.g., SHA-256).

79
New cards

What is a Digital Signature?

Verifies message origin and integrity.

80
New cards

What is IP Spoofing?

Forging source IP address to hide identity or impersonate.

81
New cards

What is MAC Spoofing?

Changing MAC address to bypass security controls.

82
New cards

What is ARP Spoofing?

Associating attacker's MAC with IP of another host.

83
New cards

What is DNS Spoofing?

Corrupting DNS cache to redirect traffic to malicious sites.

84
New cards

What is a Replay Attack?

Reusing valid data transmissions to gain access.

85
New cards

What is Man-in-the-Middle?

Intercepting communication between two systems.

86
New cards

What is a Ping of Death?

Sending oversized or malformed packets to crash a system.

87
New cards

What is a Smurf Attack?

Using spoofed ICMP echo requests to flood a target.

88
New cards

What is a Fragmentation Attack?

Sending fragmented packets to bypass defenses.

89
New cards

What is a Land Attack?

Sending packet with same source and destination IP/port.

90
New cards

What is a Teardrop Attack?

Sending overlapping IP fragments to crash systems.

91
New cards

What is Session Hijacking?

Taking over an active session between client and server.

92
New cards

What is Credential Stuffing?

Using leaked credentials in automated login attempts.

93
New cards

What is a Rogue DHCP Server?

Unauthorized DHCP server misdirecting users.

94
New cards

What is an Evil Twin Attack?

Fake Wi-Fi access point to steal data.