2.3 Vulnerability Management Flashcards
in which type of attack is a user connected to a different web server than the one intended by the user?
hyperlink spoofing attack
what is meant by VM escape?
viruses and malware can migrate multiple VMs on a single server
which type of system does a stuxnet attack target?
a supervisory control and data acquisition (SCADA) system
which type of attack involves flooding a recipient e-mail address with identical e-mails?
spamming attack
what is a replay attack?
an attack where an intruder records the communication between a user and a server, and later plays the recorded information back to impersonate the user
what is the purpose of GPS tracking on a mobile device?
it allows a mobile device to be located
what is a command injection?
when an operating system command is submitted in an HTML string
what is war chalking?
leaving signals about a wireless network on the outside of the building where it is housed
which attack is an extension of the denial-of-service (DoS) attack and uses multiple computers?
DDoS attack
which component of a computer use policy indicates that data stored on a company computer is not guaranteed to remain confidential?
a no expectation of privacy policy
how do you ensure that data is removed from a mobile device that has been stolen?
use a remote wipe or remote sanitation program
what is phishing?
when an e-mail request for confidential information that appears to originate from a bank or other trusted institution is received
what is click-jacking?
a technique that is used to trick users into revealing confidential information or taking over the user’s computer when clicking links
what does the acronym SCADA denote?
supervisory control and data acquisition
which type of attack allows an attacker to redirect internet traffic by setting up a fake DNS server to answer client requests?
DNS spoofing
what is the purpose of screen locks on mobile devices?
to prevent users from accessing the mobile device until a password or other factor is entered
which type of attack is characterized by an attacker who records an encrypted transmission between a client and a server computer so that he or she can then send it to the server to gain access?
a replay attack
why is it important to limit the use of flash drives and portable music devices by organization employees?
to prevent users from copying data to their personnel devices and possibly causing data leakage or from transferring malware to corporate computers
which type of attack is characterized by an attacker who situates himself or herself in such a way that he or she can intercept all traffic between two hosts?
man-in-the-middle
should virtual servers have the same information security requirements as physical servers?
Yes
what is a smurf attack?
an attack where a ping request is sent to a broadcast network address with the aim of overwhelming the system
what causes VM sprawl to occur?
when multiple VMs become difficult to manage
what is an Xmas attack?
an attack that looks for open ports
what is an XML injection?
when a user enters values in an XML query that takes advantage of security loopholes
what is the purpose of SCADA?
to collect data from factories, plants, or other remote locations, and send the data to a central computer that manages and controls the data
what does the acronym ICS denote?
industrial control system
which servers are susceptible to the same type of attacks as their hosts, including denial of service attacks, detection attack, and escape attacks?
virtual servers
what is spear phishing?
an e-mail request for confidential information that appears to come from your supervisor
what is the main difference between virtualization and cloud computing?
the location and ownership of the physical components
what is an evil twin?
an access point with the same SSID as the legitimate access point
what is vishing?
a special type of phishing that uses VoIP
where should you physically store mobile devices to prevent theft?
in a locked cabinet or safe
what is whaling?
a special type of phishing that targets a single power user, such as Chief Executive Officer (CEO)
what is the purpose of a remote sanitation application on a mobile device?
to ensure that the data on the mobile device can be erased remotely in the event the mobile device is lost or stolen
which address is faked with IP spoofing attacks?
the source IP address
what is bluesnarfing?
the act of gaining unauthorized access to a device (and the network it is connected to) through its bluetooth connection
which attack uses clients, handles, agents, and targets?
DDoS attack
when does path traversal occur?
when the ../ characters are entered into the URL to traverse directories that are not supposed to be available from the Web
what is war driving?
the act of discovering unprotected wireless network by driving around with a laptop
which type of attack does challenge handshake authentication protocol (CHAP) protect against?
replay
what does the acronym DDoS denote?
distributed denial of service
what is header manipulation?
when a hacker is able to manipulate a packet header to deface, hijack, or poison the packet
what is bluejacking?
an attack that sends unsolicited messages over a bluetooth connection
which attack requires that the hacker compromise as many computers as possible to initiate the attack?
DDoS attack
what is an IP spoofing attack?
an attack in which the source IP address in an IP datagram is modified to imitate the IP address of a packet originating from an authorized source
which type of attack searches long lists of words for a particular language to match them to an encrypted password?
dictionary attack
why is GPS tracking often disabled?
it is considered a security threat. as long as GPS tracking is enabled and the mobile device is powered on, the device (and possibly its user) can be located
what is spimming?
an instance of spam sent over an instant message application
what is malicious insider?
an employee who uses his access to the network and facility to obtain confidential information
what is the purpose of a screen lock on a mobile device?
to act as a deterrent if a mobile device is lost or stolen by requiring a key combination to activate the device
encrypting all files on a system hardens which major component of a server?
the file system
what is an IV attack?
cracking the WEP secret key using the initialization vector (IV)
what is pharming?
traffic redirection to a web site that looks identical to the intended web site
what is the purpose of mobile device encryption?
to ensure that the contents of the mobile device are confidential
which type of attack sequentially generates every possible password and checks them all against a password file?
brute force attack
which type of brute-force attack attempts to find any two hashed messages that have the same value?
a birthday attack