1-10 Flashcards

1
Q

What is an amplification attack?

A

Use of botnets for a DDOS or SPAM attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a reflection attack?

A

Using the victims IP to spam itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is poisoning?

A

Manipulated a trusted source of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is hijacking?

A

Intercepting communications to eavesdrop, capture, manipulate, and/or reuse packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the common types of phishing?

A

Spear fishing, Whaling, SMSishing, Vishing, Watering holes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are local types of social engineering?

A

Shoulder surfing, Piggybacking/Tailgaiting, Dumpster Diving, USB Baiting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a cross site scripting attack?

A

Injection of malicious code into a web app or back end that will execute scripts in a user’s browser. Can be persistent or reflective.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Cross Site Request Forgery?

A

Tricks a web browser into executing malicious actions on a trusted site for which the user is authenticated (usually via manipulated link/URL).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What can significantly reduce the impact of of XSS and SQL injection attacks?

A

Input and output validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is threat modeling?

A

Structured process by which potential threats, actors, and vectors can be identified, enumerated, and prioritized.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is OSINT?

A

Open Source Intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are some government sources of threat modeling data?

A

NIST, FBI, US-CERT, NVD, MITRE, and CISA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the three threat modeling approaches?

A

Asset-Centric (what/why), Architecture-Centric (how), and Attacker-Centric (who).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly