Attacks, Threats, and Vulnerabilities Flashcards

1
Q

Phishing

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Smishing

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Vishing

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Spam

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Spim

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Spear phishing

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Dumpster diving

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Shoulder surfing

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Pharming

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Tailgating

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Eliciting information

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Whaling

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Prepending

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Identity fraud

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Invoice scams

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Credential harvesting

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Reconnaissance

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Hoax

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Impersonation

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Watering hole attack

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Typosquatting

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Pretexting

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Influence campaign

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Hybrid warfare

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Authority

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Intimidation

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Consensus

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Scarcity

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Familiarity

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Trust

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Urgency

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Ransomware

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Trojans

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Worms

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

PUPs

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Fileless virus

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Command and control

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Bots

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Cryptomalware

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Logic bombs

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Spyware

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Keyloggers

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

RAT

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Rootkit

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Backdoor

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Spraying (password attack)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Dictionary (password attack)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Brute Force (password attack)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Rainbow table (password attack)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Plaintext/Unencrypted (password attack)

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Malicious USB cable

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Malicious flash drive

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Card cloning

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Skimming

A
55
Q

Adversarial AI

A
56
Q

Supply-chain attacks

A
57
Q

Cloud based vs On-premises attacks

A
58
Q

Birthday (Cryptographic attack)

A
59
Q

Collision (Cryptographic attack)

A
60
Q

Downgrade (Cryptographic attack)

A
61
Q

Privilege escalation

A
62
Q

Cross-site scripting

A
63
Q

SQL injection

A
64
Q

DLL injection

A
65
Q

LDAP injection

A
66
Q

XML injection

A
67
Q

Pointer/object dereference

A
68
Q

Directory traversal

A
69
Q

Buffer overflows

A
70
Q

Race conditions

A
71
Q

Error handling

A
72
Q

Improper input handling

A
73
Q

Replay attack

A
74
Q

Integer overflow

A
75
Q

Request forgeries

A
76
Q

API attacks

A
77
Q

Resource exhaustion

A
78
Q

Memory leak

A
79
Q

SSL stripping

A
80
Q

Shimming (Driver manipulation)

A
81
Q

Refactoring (Driver manipulation)

A
82
Q

Pass the hash

A
83
Q

Evil twin (wireless)

A
84
Q

Rogue AP

A
85
Q

Bluesnarfing

A
86
Q

Bluejacking

A
87
Q

Disassociation

A
88
Q

Jamming

A
89
Q

RFID

A
90
Q

NFC

A
91
Q

IV

A
92
Q

On-path attack

A
93
Q

ARP poisoning

A
94
Q

MAC flooding

A
95
Q

MAC cloning

A
96
Q

Domain hijacking

A
97
Q

DNS poisoning

A
98
Q

URL redirection

A
99
Q

Domain reputation

A
100
Q

DDoS

A
101
Q

Malicious code or script execution

A
102
Q

APT

A
103
Q

Insider threat

A
104
Q

State actor

A
105
Q

Hacktivist

A
106
Q

Script kiddies

A
107
Q

Criminal syndicates

A
108
Q

Hackers

A
109
Q

Shadow IT

A
110
Q

Competitors

A
111
Q

Direct access (vector)

A
112
Q

Wireless (vector)

A
113
Q

Email (vector)

A
114
Q

Supply chain (vector)

A
115
Q

Social media (vector)

A
116
Q

Removeable media (vector)

A
117
Q

Cloud (vector)

A
118
Q

OSINT

A
119
Q

Closed/proprietary threat intelligence

A
120
Q

Vulnerability databases

A
121
Q

Public/private info-sharing centers

A
122
Q

Dark web

A
123
Q

Indicators of compromise

A
124
Q

AIS

A
125
Q

Predictive analysis

A
126
Q

Threat map

A
127
Q

File/code repository

A
128
Q

Threat hunting

A
129
Q

Vulnerability scans

A
130
Q

Syslog/SIEM

A
131
Q

SOAR

A
132
Q

Pentesting

A
133
Q

Passive/active reconnaissance

A
134
Q

Exercise types

A