Attacks, Concepts and Techniques Flashcards

1
Q

Which of the following examples illustrates how malware might be concealed?

a) An attack is launched against the public website of an online retailer with the objective of blocking its response to visitors

b) An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware

c) A hacker uses techniques to improve the ranking of a website so that users are redirected to a malicious site

d) A botnet of zombies carry personal information back to the hacker

A

(b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following characteristics describe a worm?

Select two correct answers

(a) Infects computers by attaching to software code

(b) Hides in a dormant state until needed by an attacker

(c) Executes when software is run on a computer

(d) Is self-replicating

(e) Travels to new computers without any intervention or knowledge of the user

A

It is self-replicating and Travels to new computers without any intervention or knowledge of the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the primary goal of a DoS attack?

(a) To obtain all addresses in the address book within the server

(b) To facilitate access to external networks

(c) To prevent the target server from being able to handle additional requests

(d) To scan the data on the target server

A

To prevent the target server from being able to handle additional requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of attack allows an attacker to use a brute-force approach?

(a) Social engineering

(b) Denial of service

(c) Packet sniffing

(d) Password cracking

A

Password cracking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A set of changes done to any program or application with the aim of updating, fixing or improving it is often referred to as what?

(a) A fix

(b) A patch

(c) An install

(d) A hack

A

A patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following should be carried out to address known software vulnerabilities of a specific application?

(a) Remove the application

(b) Install a security patch

(c) Change the hardware

(d) Change the software

A

Install a security patch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Buffer overflow vulnerability?

A

Occurs when data is written beyond the limits of memory areas that are allocated to an application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a Race condition vulnerability?

A

Occurs when an ordered or timed set of processes is disrupted or altered by an exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an access control vulnerability?

A

Occurs through the improper use of practices that manage equipment, data or applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Where is cryptocurrency stored?

(a) In a wallet

(b) On an exchange

(c) In a bank account

(d) On the blockchain

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly