Attacks, Threats, and Vulnerabilities Flashcards

1
Q

Phishing

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Smishing

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Vishing

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Spam

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Spim

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Spear phishing

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Dumpster diving

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Shoulder surfing

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Pharming

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Tailgating

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Eliciting information

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Whaling

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Prepending

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Identity fraud

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Invoice scams

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Credential harvesting

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Reconnaissance

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Hoax

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Impersonation

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Watering hole attack

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Typosquatting

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Pretexting

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Influence campaign

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Hybrid warfare

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Authority

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Intimidation

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Consensus

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Scarcity

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Familiarity

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Trust

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Urgency

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Ransomware

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Trojans

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Worms

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

PUPs

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Fileless virus

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Command and control

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Bots

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Cryptomalware

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Logic bombs

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Spyware

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Keyloggers

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

RAT

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Rootkit

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Backdoor

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Spraying (password attack)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Dictionary (password attack)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Brute Force (password attack)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Rainbow table (password attack)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Plaintext/Unencrypted (password attack)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Malicious USB cable

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Malicious flash drive

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Card cloning

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Skimming

55
Q

Adversarial AI

56
Q

Supply-chain attacks

57
Q

Cloud based vs On-premises attacks

58
Q

Birthday (Cryptographic attack)

59
Q

Collision (Cryptographic attack)

60
Q

Downgrade (Cryptographic attack)

61
Q

Privilege escalation

62
Q

Cross-site scripting

63
Q

SQL injection

64
Q

DLL injection

65
Q

LDAP injection

66
Q

XML injection

67
Q

Pointer/object dereference

68
Q

Directory traversal

69
Q

Buffer overflows

70
Q

Race conditions

71
Q

Error handling

72
Q

Improper input handling

73
Q

Replay attack

74
Q

Integer overflow

75
Q

Request forgeries

76
Q

API attacks

77
Q

Resource exhaustion

78
Q

Memory leak

79
Q

SSL stripping

80
Q

Shimming (Driver manipulation)

81
Q

Refactoring (Driver manipulation)

82
Q

Pass the hash

83
Q

Evil twin (wireless)

84
Q

Rogue AP

85
Q

Bluesnarfing

86
Q

Bluejacking

87
Q

Disassociation

88
Q

Jamming

92
Q

On-path attack

93
Q

ARP poisoning

94
Q

MAC flooding

95
Q

MAC cloning

96
Q

Domain hijacking

97
Q

DNS poisoning

98
Q

URL redirection

99
Q

Domain reputation

100
Q

DDoS

101
Q

Malicious code or script execution

103
Q

Insider threat

104
Q

State actor

105
Q

Hacktivist

106
Q

Script kiddies

107
Q

Criminal syndicates

108
Q

Hackers

109
Q

Shadow IT

110
Q

Competitors

111
Q

Direct access (vector)

112
Q

Wireless (vector)

113
Q

Email (vector)

114
Q

Supply chain (vector)

115
Q

Social media (vector)

116
Q

Removeable media (vector)

117
Q

Cloud (vector)

118
Q

OSINT

119
Q

Closed/proprietary threat intelligence

120
Q

Vulnerability databases

121
Q

Public/private info-sharing centers

122
Q

Dark web

123
Q

Indicators of compromise

125
Q

Predictive analysis

126
Q

Threat map

127
Q

File/code repository

128
Q

Threat hunting

129
Q

Vulnerability scans

130
Q

Syslog/SIEM

131
Q

SOAR

132
Q

Pentesting

133
Q

Passive/active reconnaissance

134
Q

Exercise types