2.2.1, 2.4.8, 2.4.9 Flashcards
Which vector exploits vulnerabilities in communication channels like email, text messaging, or social media to deliver content or trick users into revealing sensitive information?
Message-based
What precaution should users take to mitigate risks associated with image-based attacks?
Disable image previews in email clients
Which vector leverages malicious code embedded within harmless files to compromise systems or steal data?
File-based
What precaution should individuals take when dealing with unexpected phone calls to mitigate voice call attacks?
Verify the caller’s identity before providing any information
Which vector exploits the trust often placed in removable devices to infiltrate systems and compromise data?
Removable device
What is a characteristic of client-based vulnerabilities?
They require installation of specific client applications by the user
Which vector targets unsupported systems and applications, making them prime targets for attackers due to unaddressed vulnerabilities?
System-based
What precaution can be taken to mitigate wireless network-based attacks?
Enforce multi-factor authentication
What is the primary goal of a Denial of Service (DoS) attack?
To disrupt the availability of a service or information
What type of DoS attack can be inadvertently caused by improper configuration, leading to a broadcast storm?
Switching loop
What is a Distributed Denial of Service (DDoS) attack characterized by?
Multiple agents attacking a certain system
What is the primary difference between a network DDoS attack and an application DDoS attack?
Network DDoS attacks target an entire network to shut it down
What is an amplified DDoS attack?
Leveraging servers to create a significantly larger response to a small request
How do reflected DDoS attacks work?
Exploit servers to reflect attack traffic towards the target
What is the key defense measure against DDoS attacks mentioned in the text?
Using experimental and signature-based IDS/IPS for security monitoring