Ethical Hacking Essentials Module 1 Exam questions with accurate
|| || || || || || || || ||
detailed answers ||
Elements of information security - ✔✔Confidentiality
|| || || || ||
Integrity
Availability
Authenticity
Non-repudiation
Confidentiality - ✔✔information that is accessible only to those authorized to have access
|| || || || || || || || || || || ||
Integrity - ✔✔The trustworthiness of data or resources
|| || || || || || ||
Availability - ✔✔Systems responsible for delivering, storing, and processing information are
|| || || || || || || || || ||
accessible when required by the authorized users.
|| || || || || || ||
Authenticity - ✔✔Any data characteristics that ensures the quality of being genuine.
|| || || || || || || || || || ||
Non-repudiation - ✔✔Guarantee that the sender of a message cannot later deny having sent
|| || || || || || || || || || || || ||
the message and that the recipient cannot deny having received the message
|| || || || || || || || || || || ||
Level of security define by: - ✔✔Functionality (Features)
|| || || || || || ||
Security (Restrictions)
||
Usability (GUI) ||
Attacks = - ✔✔Motive (Goal) + Method + Vulnerability
|| || || || || || || ||
, 2
Attackers try various tools and attack techniques - ✔✔to exploit vulnerabilities
|| || || || || || || || || ||
Classification of attacks - ✔✔Passive Attacks || || || || ||
Active Attacks
||
Close-In Attacks ||
Insider Attacks
||
Distribution Attacks ||
Passive Attack - ✔✔Attack where the attacker does not interact with processing or
|| || || || || || || || || || || || ||
communication activities, but only carries out observation and data collection, as in
|| || || || || || || || || || || ||
network sniffing. ||
Active Attack - ✔✔An attempt to alter system resources or affect their operation
|| || || || || || || || || || || ||
Close-In Attack - ✔✔Consists of a regular type individuals attaining close physical
|| || || || || || || || || || || ||
proximity to networks systems or facilities for the purpose of modifying, gathering or
|| || || || || || || || || || || || ||
denying access to information
|| || ||
Insider Attack - ✔✔When someone within an organization exploits their network access to
|| || || || || || || || || || || || ||
steal information
||
Distribution Attacks - ✔✔Occur when attackers tamper with hardware or software prior to
|| || || || || || || || || || || || ||
installation.
Information Security Attack Vectors - ✔✔Cloud Computing Threats
|| || || || || || ||
Advanced Persistent Threats (APT) || || ||