2 Flashcards

1
Q

Supply chain attacks

A

Involves a threat actor seeking methods to infiltrate a company in its supply chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cloud-based attacks

A

Involves a threat actor compromising one account with access to cloud resources to compromise other cloud assets further

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Birthday attack

A

Brute force attack aimed at exploiting collisions in hash function

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Universal Serial Bus (USB) cable attack

A

Involves accessing unsuspecting user after they try to plug their devices into malicious usb cables or plus, similar to card skimmers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Watering hole attack

A

A social engineering technique where the attacker identifies a popular and frequently visited website used by the target group and compromises the website with exploit code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Pharming

A

Involves redirecting users from legitimate websites to malicious ones by corrupting the victim’s computer’s name resolution process. Not specific to targeting group of individuals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Spear phishing

A

Highly targeted social engineering attack focusing on a specific individual within a company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Impersonation

A

Pretending to be someone else to deceive the target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A threat actor gains physical access to an organization’s premises and attempts to perpetrate an attack on the wired network. What specific threat vectors associated with unsecured networks are likely used by the threat actor in this scenario?

A

Direct Access Threat Vector as it involves using physical access to perpetrate an attack, such as accessing an unlocked workstation or stealing a PC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Remote and Wireless Network threat vector

A

Involves obtaining credentials for remote access or wireless connection to the network or spoofing a trusted resource like an access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Bluetooth network threat vector

A

Involves exploiting vulnerabilities or misconfigurations in bluetooth devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Default credentials threat vector

A

Refer to gaining control of a network device or app due to default passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

SMIShing

A

Social engineering attack that uses text messages to trick ppl into sharing sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Vishing

A

Type of phishing attack conducted through a voice channel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Phishing

A

Social engineering technique that tricks the target into interacting with malicious resource disguised as a trusted one, often using email as the vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Flexible Authentication via Secure Tunneling (EAP-FAST)

A

Cisco’s replacement for LEAP. It addresses LEAP vulnerabilities using transport Layer Security (TLS) with protected access credentials (PAC) instead of certificates.

17
Q

Protected Extensible Authentication Protocol (PEAP)

A

Uses a server side public key certificate to create an encrypted tunnel between the supplicant and authentication server

18
Q

EAP-MD5

A

Secure hash of a password sent to the authenticating server. Does not provide mutual authentication from the client to the supplicant

19
Q

RADIUS federation

A

Multiple organizations allow access to each other’s users by joining their RADIUS servers into a RADIUS hierarchy.

20
Q

Mitigating VME

A

Virtual machine escape is a critical security issue in a virtualized environment, where an application, process or user within a virtual machine can bypass the virtual machine’s barriers and interact directly with the host system.

21
Q

Input validation and sanitization techniques helps protect against SQLi and XSS attack by

A

Filtering out malicious scripts or queries before they reach the database or the user’s browser.

22
Q

End of life system vulnerability includese

A

Instances where a specific product or version of product that the manufacturer or vendor publicly declares as no longer supported.

23
Q

The effect of isolating the legacy machines on a separate network segment

A

Minimizes the risk of potential vulnerabilities spreading from these machines to the rest of the network

24
Q

Firmware vulnerabilities

A

Include instances where processors inside the the computer allow malicious program to steal data during processing

25
Q

Virtualization vulnerabilities

A

Includes Virtual Machine (VM) escape when an attacker with access to a VM breaks out of this isolated environment and gins access t the host system or other Vm running on the same host

26
Q

Importance of secure deallocation

A

Takes any residual data in a resource (Memory, disk space, etc) and clean or overwrites it before reuse, preventing potntial data leakage.

27
Q

Memory Injection Vulnerability

A

Refers to a security flaw where an attacker can introduce or inject malicious code into a running application’s process memory