1: 5 Common Attacks Flashcards

1
Q

Hash Function

A

Maps data of an arbitrary size to a fixed-sized value

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Brute Force Hash Analysis

A

Attacks the computer’s 1-way Hash Function through many input/output analysis to find vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Where should hashes be stored?

A

Shadow Password File

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Where shouldn’t hashes be stored

A

/etc/password File

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Brute Force Attack

A

Guesses passwords by trying all possibilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Dictionary Attack

A

Guesses passwords by using a list of all known words

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Hybrid Attack

A

Guesses passwords by adding variations to known words

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Rainbow Table Attacks

A

Guess passwords by precomputing common hashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Password Spraying

A

Guesses passwords across multiple systems using a list of commonly used passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the best way to protect against password spraying?

A

Prohibit the use of common passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Credential Stuffing

A

Attacking by reusing the same username/password against multiple sites. This username/password can be obtained by initially targeting the weakest sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the best way to protect against credential stuffing?

A

Password manager tools and maintaining unique passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Multi-Factor Authentication

A

Electronic authentication method in which a device user is granted access to a website or application only after successfully presenting two or more pieces of evidence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the three types of machine learning?

A

Descriptive analytics, predictive analytics, prescriptive analytics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Descriptive Analytics

A

Describes our data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Predictive Analytics

A

Predict future events

17
Q

Prescriptive Analytics

A

Optimize our behavior by running many simulations

18
Q

Adversarial AI

A

Breach confidentiality of machine learning algorithms, including injecting tainted data into simulations or fooling algorithms.

19
Q

What is the best way to protect against Adversarial AI

A

Build robust AI models