2.2.1, 2.4.8, 2.4.9 Flashcards

1
Q

Which vector exploits vulnerabilities in communication channels like email, text messaging, or social media to deliver content or trick users into revealing sensitive information?

A

Message-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What precaution should users take to mitigate risks associated with image-based attacks?

A

Disable image previews in email clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which vector leverages malicious code embedded within harmless files to compromise systems or steal data?

A

File-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What precaution should individuals take when dealing with unexpected phone calls to mitigate voice call attacks?

A

Verify the caller’s identity before providing any information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which vector exploits the trust often placed in removable devices to infiltrate systems and compromise data?

A

Removable device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a characteristic of client-based vulnerabilities?

A

They require installation of specific client applications by the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which vector targets unsupported systems and applications, making them prime targets for attackers due to unaddressed vulnerabilities?

A

System-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What precaution can be taken to mitigate wireless network-based attacks?

A

Enforce multi-factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the primary goal of a Denial of Service (DoS) attack?

A

To disrupt the availability of a service or information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of DoS attack can be inadvertently caused by improper configuration, leading to a broadcast storm?

A

Switching loop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Distributed Denial of Service (DDoS) attack characterized by?

A

Multiple agents attacking a certain system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the primary difference between a network DDoS attack and an application DDoS attack?

A

Network DDoS attacks target an entire network to shut it down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an amplified DDoS attack?

A

Leveraging servers to create a significantly larger response to a small request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do reflected DDoS attacks work?

A

Exploit servers to reflect attack traffic towards the target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the key defense measure against DDoS attacks mentioned in the text?

A

Using experimental and signature-based IDS/IPS for security monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the main goal of a network DDoS attack?

A

To disrupt an entire network

17
Q

What is the primary difference between DoS and DDoS attacks?

A

DDoS attacks utilize multiple agents to amplify traffic

18
Q

What can inadvertently cause a Denial of Service attack, as mentioned in the text?

A

Inadequate bandwidth for the environment

19
Q

What is domain hijacking?

A

Illegally changing the registration of a domain name

20
Q

What is the primary purpose of DNS servers?

A

To translate between domain names and IP addresses

21
Q

What is DNS poisoning, also known as DNS spoofing?

A

Altering server DNS information to redirect users to malicious websites

22
Q

How does URL redirection pose a security risk?

A

By redirecting users to unintended, usually malicious, websites

23
Q

What is the primary purpose of a domain reputation service?

A

To verify and mark domain reputations as trusted or untrusted

24
Q

How does DNSSEC help prevent DNS poisoning attacks?

A

By securing DNS records with digital signatures

25
Which of the following is NOT a common type of domain attack mentioned in the text?
Domain registration
26
What can happen if a user is redirected to a malicious website through URL redirection?
They may be subject to phishing attacks or malware downloads
27
What is the primary purpose of domain name registries?
To ensure only one owner can possess a domain name at a time
28
How does domain hijacking impact the affected organization?
It requires time and paperwork to reverse the illegal change