Attacks, Threats and Vulnerabilities Flashcards

1
Q

What kind of attack is an example of IP spoofing?

A

Man-In-the-middle (MITM) Attack

Explanation - The man-in-the-middle attack intercepts communications between two systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What technique would you use to determine the current version of SSH running on a web server?

A

Banner Grabbing

Explanation - This process involves actively connecting to the server using telnet or netcat and collecting the response from the webserver.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What scanning topology would be BEST able to meet the following requirements?

  • vulnerability scans of centrally managed workstations and network devices (I.e., Laptops)
  • Ability to scale up and down as new members use the network
  • Minimal number of false positives to ensure result accuracy
A

A combination of cloud-based and server-based scanning engines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a “Highjacked” E-mail?

A

This occurs when someone takes over your email account and sends out messages on your behalf.

This can also occur after a system is taken over by an attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of Vulnerability Scan would BEST assist in determining if a targets configuration settings are correct?

A

Credentialed Scans

Explanations - The credentialed scans log into a system and retrieve their configuration information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are considered “Private IP Addresses?”

A

10.x.x.x
172.16-32.x.x
192.168.x.x.

All other IP addresses are considered publicly routable over the internet (except localhost and APIPA addresses)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What best describes a hash value that is related to malware associated with an advanced persistent threat (APT)?

A

This is an Indicator of Compromise or “IOC”

Explanation - This is an artifact observed on a network or in an operating system that, with high confidence, indicates a computer intrusion.

Note: IOCs are typically virus signatures and IP addresses, MD5 hashes of malware files or URLs or domain names of botnet command and control servers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly