5 Flashcards
Remapping a domain name to a rogue IP address is an example of what kind of exploit?
DNS poisoning
URL redirection is a characteristic feature of:
Pharming
Which of the following enables client-side URL redirection?
Hosts
Which of the following factors has the biggest impact on domain reputation?
Distribution of spam
As opposed to the simple Denial of Service (DoS) attacks that usually are performed from a single system, a Distributed Denial of Service (DDoS) attack uses multiple compromised computer systems to perform the attack against its target. The intermediary systems that are used as platform for the attack are the secondary victims of the DDoS attack; they are often referred to as zombies, and collectively as a botnet.
True
What is the most common form of a DDoS attack?
Network-based
Which type of DDoS attack targets industrial equipment and infrastructure?
** OT **
Operational technology (OT) is the hardware and software that monitors and controls devices, processes, and infrastructure, and is used in industrial settings
Which of the following answers lists the filename extension of a Microsoft PowerShell script file?
.ps1
Which of the following answers refers to a filename extension used in a cross-platform, general-purpose programming language?
.py
Which of the following answers refers to a script file type designed to be run in Unix command line?
sh
Which of the following enables running macros in Microsoft Office applications?
VBA
Files with this filename extension are used in a scripting language based on the Microsoft’s Visual Basic programming language
vbs
Which statements best describe the attributes of an APT? (Select 3 answers)
- High level of technical sophistication
- Extensive amount of resources/funding
- Typically funded by governments/nation states
Which term best describes a disgruntled employee abusing legitimate access to company’s internal resources?
Insider threat
Which of the following statements does not match a typical description of nation states or state-funded groups identified as threat actors?
Typically classified as an internal threat