2.2.1, 2.4.8, 2.4.9 Flashcards

1
Q

Which vector exploits vulnerabilities in communication channels like email, text messaging, or social media to deliver content or trick users into revealing sensitive information?

A

Message-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What precaution should users take to mitigate risks associated with image-based attacks?

A

Disable image previews in email clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which vector leverages malicious code embedded within harmless files to compromise systems or steal data?

A

File-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What precaution should individuals take when dealing with unexpected phone calls to mitigate voice call attacks?

A

Verify the caller’s identity before providing any information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which vector exploits the trust often placed in removable devices to infiltrate systems and compromise data?

A

Removable device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a characteristic of client-based vulnerabilities?

A

They require installation of specific client applications by the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which vector targets unsupported systems and applications, making them prime targets for attackers due to unaddressed vulnerabilities?

A

System-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What precaution can be taken to mitigate wireless network-based attacks?

A

Enforce multi-factor authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the primary goal of a Denial of Service (DoS) attack?

A

To disrupt the availability of a service or information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of DoS attack can be inadvertently caused by improper configuration, leading to a broadcast storm?

A

Switching loop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Distributed Denial of Service (DDoS) attack characterized by?

A

Multiple agents attacking a certain system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the primary difference between a network DDoS attack and an application DDoS attack?

A

Network DDoS attacks target an entire network to shut it down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an amplified DDoS attack?

A

Leveraging servers to create a significantly larger response to a small request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do reflected DDoS attacks work?

A

Exploit servers to reflect attack traffic towards the target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the key defense measure against DDoS attacks mentioned in the text?

A

Using experimental and signature-based IDS/IPS for security monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the main goal of a network DDoS attack?

A

To disrupt an entire network

17
Q

What is the primary difference between DoS and DDoS attacks?

A

DDoS attacks utilize multiple agents to amplify traffic

18
Q

What can inadvertently cause a Denial of Service attack, as mentioned in the text?

A

Inadequate bandwidth for the environment

19
Q

What is domain hijacking?

A

Illegally changing the registration of a domain name

20
Q

What is the primary purpose of DNS servers?

A

To translate between domain names and IP addresses

21
Q

What is DNS poisoning, also known as DNS spoofing?

A

Altering server DNS information to redirect users to malicious websites

22
Q

How does URL redirection pose a security risk?

A

By redirecting users to unintended, usually malicious, websites

23
Q

What is the primary purpose of a domain reputation service?

A

To verify and mark domain reputations as trusted or untrusted

24
Q

How does DNSSEC help prevent DNS poisoning attacks?

A

By securing DNS records with digital signatures

25
Q

Which of the following is NOT a common type of domain attack mentioned in the text?

A

Domain registration

26
Q

What can happen if a user is redirected to a malicious website through URL redirection?

A

They may be subject to phishing attacks or malware downloads

27
Q

What is the primary purpose of domain name registries?

A

To ensure only one owner can possess a domain name at a time

28
Q

How does domain hijacking impact the affected organization?

A

It requires time and paperwork to reverse the illegal change