A Flashcards

1
Q

Availability

A

Assurance that the systems responsible for delivering, storing, and processing information are accessible when required by the authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Authenticity

A

Refers to the characteristic of a communication, document, or any data that ensures the quality of being genuine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Active Attacks

A

Active attacks tamper with the data in transit or disturb communication or services between the systems to bypass or break into secured systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Adversary Behavioral Identification

A

Adversary behavioral identification involves the identification of the common methods or techniques followed by an adversary to launch attacks on or to penetrate an organization’s network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Active Footprinting

A

Active footprinting involves gathering information about the target with direct interaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ARP Ping Scan

A

Attackers send ARP request probes to target hosts, and an ARP response indicates that the host is active.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ACK Flag Probe Scan

A

Attackers send TCP probe packets set with an ACK flag to a remote device, and then analyze the header information (TTL and WINDOW field) of received RST packets to determine if the port is open or closed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Anonymizer

A

An anonymizer is an intermediate server placed between you as the end user and the website to access the website on your behalf and make your web surfing activities untraceable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Audio Steganography

A

Audio steganography refers to hiding secret information in audio files such as .MP3, .RM, and .WAV.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Advanced Persistent Threats

A

Advanced persistent threats (APTs) are defined as a type of network attack, where an attacker gains unauthorized access to a target network and remains undetected for a long period of time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Antivirus Sensor System

A

An antivirus sensor system is a collection of computer software that detects and analyzes malicious code threats such as viruses, worms, and Trojans.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Active Sniffing

A

Active sniffing involves injecting Address Resolution Packets (ARP) into the network to flood the switch’s Content Addressable Memory (CAM) table, which keeps track of host-port connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Address Resolution Protocol (ARP)

A

Address Resolution Protocol (ARP) is a stateless protocol used for resolving IP addresses to machine (MAC) addresses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

ARP Spoofing Attack

A

ARP spoofing involves constructing many forged ARP request and reply packets to overload the switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Application Level Hijacking

A

Application level hijacking refers to gaining control over the HTTP’s user session by obtaining the session IDs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Anomaly Detection

A

It detects the intrusion based on the fixed behavioral characteristics of the users and components in a computer system.

17
Q

Application-Level Firewall

A

Application-level gateways (proxies) can filter packets at the application layer of the OSI model (or the application layer of TCP/IP).

18
Q

Application Proxy

A

An application-level proxy works as a proxy server and filters connections for specific services.

19
Q

API DDoS Attack

A

The DDoS attack involves saturating an API with a huge volume of traffic from multiple infected computers (botnet) to delay API services to legitimate users.

20
Q

Automated Web App Security Testing

A

It is a technique employed for automating the testing process. These testing methods and procedures are incorporated into each stage of development to report feedback constantly.

21
Q

Application Whitelisting

A

Application whitelisting contains a list of application components such as software libraries, plugins, extensions, and configuration files, which can be permitted to execute in the system.

22
Q

Application Blacklisting

A

Application blacklisting contains a list of malicious applications or software that are not permitted to be executed in the system or the network.

23
Q

Access point (AP)

A

An AP is used to connect wireless devices to a wireless/wired network.

24
Q

Association

A

It refers to the process of connecting a wireless device to an AP.

25
Q

Agent Smith Attack

A

Agent Smith attacks are carried out by luring victims into downloading and installing malicious apps designed and published by attackers in the form of games, photo editors, or other attractive tools from third-party app stores such as 9Apps.
 :

26
Q

Android Rooting

A

Rooting process involves exploiting security vulnerabilities in the device firmware and copying the SU binary to a location in the current process’s PATH (e.g., /system/xbin/su) and granting it executable permissions with the chmod command.

27
Q

Asymmetric Encryption

A

Asymmetric encryption (public-key) uses different encryption keys, which are called public and private keys for encryption and decryption, respectively.

28
Q

Advanced Encryption Standard (AES)

A

The Advanced Encryption Standard (AES) is a National Institute of Standards and Technology (NIST) specification for the encryption of electronic data.