2.4 Flashcards

1
Q

How is phising usually delivered ?

A

Phone, sms or email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is phishing ?

A

Social engineering with a touch of spoofing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a good indication of phishing ?

A

Provided URL, dodgy font, graphics or spelling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Vishing ?

A

Vishing is done over phone (basically Caller ID is spoofed).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Give an example of Vishing

A

Fake security checks or bank updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Wireless evil twins ?

A

Fraudulent Wi-Fi access point that appears to be legitimate but is set up to eavesdrop on wireless communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is spear phishing ?

A

Going for a specific groups of users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a good resource for monitoring zero-day attacks ?

A

Checking hacker forums/websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is spoofing ?

A

Masquerading as another user or device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Give some examples of spoofing

A

Faking a Legitimate:
IP address.
MAC address.
Username/password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the result of a Structured Query Language (SQL) injection ?

A

Attacker gains acces to a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is good practice in preventing a wireless evil twin ?

A

Encrypt i.e. https and a VPN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does a anti-DDoS system do ?

A

Filter out traffic by looking for patterns associated with DDoS attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the two kinds of on path attacks ?

A

Network and browser
https://www.youtube.com/watch?v=pY20_7l8AKc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a SQL injection ?

A

A web application security vulnerability that allows an attacker to inject malicious code into a SQL statement through user input.

17
Q

What is the difference between adware and spyware ?

A

Adware to generates revenue through the display of advertisements
Spyware is designed to collect sensitive information without the user’s knowledge or consent.

18
Q

What is ARP spoofing ?

A

MAC address is faked.

19
Q

What is an insider threat ?

A

Any current or former employee, contractor, or business partner who has or had authorized access and misused said access.

20
Q

What is phishing over sms sometimes referred to as ?

A

Smishing

21
Q

What is arp spoofing ?

A

Attacker spoofs the IP to MAC mapping usually to perform a man-in-the-middle attack

22
Q

What kind of attack is IP spoofing ?

A

On path attach

23
Q

What is arp poisoning ?

A

Sending fake ARP packets that link an attacker’s MAC address with an IP of a computer already on the LAN.