Incident Handling | SQL Injection/XSS | Hacking | Password and Hash Cracking | Hackers |
---|---|---|---|---|
What is the Help desk?
The front line to which incidents should be reported.
|
What is a web form?
This type of input can be attacked by SQL injection.
|
What is useful specific system and network information?
The target of enumeration.
|
What is a hash value?
This is the result of a one way algorithm which cannot be reversed.
|
What are White hat, Black hat, Gray hat, and Script Kiddies?
The four types of hackers.
|
What is the Containment phase?
System-backups should be made during this phase of the Incident Handling process (not preparation).
|
What is technical?
Access control lists are this type of defense against hacking.
|
What are photons?
[!!!DAILY DOUBLE!!!!]
Quantum encryption uses the polarity of these entangled atomic structures to ensure absolute integrity of packets. |
||
What is System Development?
This activity should cease to continue during Incident Response of that system.
|
What is SQL injection?
The most common hacking attack.
|
What is rainbow tables?
Large databases of pre-discovered algorithm variations used to decipher hash values.
|
||
What is an event?
Any observable occurrence in a system and/or network.
|
What is input validation?
Database administrators should use this when coding their DB to protect from SQLi.
|
What is Black box?
During this type of test the hacker has no knowledge of the target network.
|
What is a dictionary attack?
To perform this attack a large list of words is created (some times specially crafted) to crack a password or set of passwords.
|
|
What is Preparation, Detection, Containment, Eradication, Recovery, Follow-Up?
The 6 steps of the Incident Response process.
|
What is 'OR''=' ?
The base code used to test if a site is vulnerable to SQLi.
|
What is a SALT?
A special value tagged onto the end of a hash values in a database to make the values unique. This special value acts as a key shared only between the server and the client.
|
||