2.3 Vulnerability Management Flashcards
in which type of attack is a user connected to a different web server than the one intended by the user?
hyperlink spoofing attack
what is meant by VM escape?
viruses and malware can migrate multiple VMs on a single server
which type of system does a stuxnet attack target?
a supervisory control and data acquisition (SCADA) system
which type of attack involves flooding a recipient e-mail address with identical e-mails?
spamming attack
what is a replay attack?
an attack where an intruder records the communication between a user and a server, and later plays the recorded information back to impersonate the user
what is the purpose of GPS tracking on a mobile device?
it allows a mobile device to be located
what is a command injection?
when an operating system command is submitted in an HTML string
what is war chalking?
leaving signals about a wireless network on the outside of the building where it is housed
which attack is an extension of the denial-of-service (DoS) attack and uses multiple computers?
DDoS attack
which component of a computer use policy indicates that data stored on a company computer is not guaranteed to remain confidential?
a no expectation of privacy policy
how do you ensure that data is removed from a mobile device that has been stolen?
use a remote wipe or remote sanitation program
what is phishing?
when an e-mail request for confidential information that appears to originate from a bank or other trusted institution is received
what is click-jacking?
a technique that is used to trick users into revealing confidential information or taking over the user’s computer when clicking links
what does the acronym SCADA denote?
supervisory control and data acquisition
which type of attack allows an attacker to redirect internet traffic by setting up a fake DNS server to answer client requests?
DNS spoofing
what is the purpose of screen locks on mobile devices?
to prevent users from accessing the mobile device until a password or other factor is entered
which type of attack is characterized by an attacker who records an encrypted transmission between a client and a server computer so that he or she can then send it to the server to gain access?
a replay attack
why is it important to limit the use of flash drives and portable music devices by organization employees?
to prevent users from copying data to their personnel devices and possibly causing data leakage or from transferring malware to corporate computers
which type of attack is characterized by an attacker who situates himself or herself in such a way that he or she can intercept all traffic between two hosts?
man-in-the-middle
should virtual servers have the same information security requirements as physical servers?
Yes
what is a smurf attack?
an attack where a ping request is sent to a broadcast network address with the aim of overwhelming the system
what causes VM sprawl to occur?
when multiple VMs become difficult to manage