Incident Handling SQL Injection/XSS Hacking Password and Hash Cracking Hackers
100
What is the Help desk?
The front line to which incidents should be reported.
100
What is a web form?
This type of input can be attacked by SQL injection.
100
What is useful specific system and network information?
The target of enumeration.
100
What is a hash value?
This is the result of a one way algorithm which cannot be reversed.
100
What are White hat, Black hat, Gray hat, and Script Kiddies?
The four types of hackers.
200
What is the Containment phase?
System-backups should be made during this phase of the Incident Handling process (not preparation).
200
What is Users?
XSS attempts to exploit this.
200
What is technical?
Access control lists are this type of defense against hacking.
200
What are photons?
[!!!DAILY DOUBLE!!!!]
Quantum encryption uses the polarity of these entangled atomic structures to ensure the integrity of transmitted data.
200
What is hacktivism?
When the motivation to hack is for a cause (not for money, information, data, ect.)
300
What is System Development?
This activity should cease to continue during Incident Response of that system.
300
What are database vulnerabilities?
Unused stored procedures, services account privilege issues, weak or poor authentication methods enabled, and no (or limited) audit log settings.
300
What is SQL injection?
The most common hacking attack.
300
What is rainbow tables?
Large databases of pre-discovered algorithm variations used to decipher hash values.
300
What is 1988, who is Robert T. Morris?
The first computer worm was created in this year, by this person.
400
What is an event?
Any observable occurrence in a system and/or network.
400
What is input validation?
Database administrators should use this when coding their DB to protect from SQLi.
400
What is Black box?
During this type of test the hacker has no knowledge of the target network.
400
What is a dictionary attack?
To perform this attack a large list of words is created (some times specially crafted) to crack a password or set of passwords.
400
What is penetration testing?
Hacking in a controlled environment with the intention of finding holes in the security of a specified target.
500
What is Preparation, Detection, Containment, Eradication, Recovery, Follow-Up?
The 6 steps of the Incident Response process.
500
What is 'OR''=' ?
The base code used to test if a site is vulnerable to SQLi.
500
What is a motivation?
In relation to hacking hacktivism is this.
500
What is a SALT?
A special value tagged onto the end of a hash values in a database to make the values unique. This special value acts as a key shared only between the server and the client.
500
What is a hacker fallacy?
An example of one of them is "No-Harm-Done".






Network Security Final Exam

Press F11 for full screen mode



Limited time offer: Membership 25% off


Clone | Edit | Download / Play Offline