Attacks And Response Flashcards

1
Q

SQL Injection Attack

A

Leverage a reverse proxy system and scan incoming packets for malicious behavior

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Man-in-the-middle attack

A

Mitigate by using an application-layer proxy or an IPS, and train users about fake security certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

RPC attack

A

Mitigate with regular Os and application patching - Session Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Port Scanner

A

Mitigate by using a packet-filtering firewall - Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ping Sweep Attack

A

Mitigate by using a packet-filter firewall - Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

VLAN hopping

A

Configure the VLAN tagging per the switch vendor’s recommendations - Data Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Wiretapping

A

Look for physical vulnerabilities, check the locks on doors, racks, and wiring closets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SQL Injection

A

Use reverse proxy system and scan incoming packets.
Use web-application firewall with rules to filter dangerous requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Buffer Overflow

A

Firewall to prevent suspicious data from being sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Man in the Middle

A

Intrusion Prevention systems and IPSec can help

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

VLAN Hopping

A

Configure the switch access control file - Data Link Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Ping of Death

A

Configure Web Application firewall to drop malformed packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ping Flood

A

Configure firewall to disallow and use intrusion prevention systems - Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SMURF DDoS

A

Disable IP
Reconfigure your operating system to disallow ICMP responses to IP broadcast requests.
Reconfigure the perimeter firewall to disallow pings originating from outside your network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Deauth Attack

A

WPA3 & WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

RPC Exploit

A

Proxy firewall and intrusion detection

17
Q

Phishing/Spear Phishing

A

Training on how to recognize & report phishing emails

18
Q

Viruses/worms

A

Anti-virus software

19
Q

Trojans

A

Use firewall software to mitigate