Chapter 14 Flashcards

1
Q

Social engineering

A

The practice of exploiting people to gain access to unauthorized areas and systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Phishing

A

An attack that uses a malicious email crafted to look legitimate. The intent is to have a user click a link to a malicious website or download a malicious file.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Spear phishing

A

A phishing attack that is designed to target a specific person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Vishing

A

A social engineering attack in which the hacker attempts to get sensitive information from a user over the phone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Shoulder surfing

A

A social engineering attack in which the hacker gathers sensitive information by looking over a target’s shoulder while the target is working on a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Tailgating

A

A social engineering attack that allows the hacker to bypass access control systems by closely following a legitimate user into a building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Impersonation

A

A social engineering attack in which the hacker attempts to gain access to the building by pretending to be a legitimate or authorized person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Dumpster diving

A

A social engineering attack in which the hacker goes through the trash to find sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Evil twin

A

A rogue access point that is configured to mimic a legitimate wireless network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Denial of service (Dos)

A

An attack that is designed to overload the target with more data than it can handle, causing it to shut down. A distributed denial of service (DDoS) attack uses multiple computers to carry out the attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SQL injection

A

An attack designed to target databases.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cross-site scripting (XSS)

A

An attack designed to target improperly configured input fields on a website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

On-path attack

A

An attack in which the attacker intercepts a communication. The attacker may obtain data from and/or manipulate the data before sending it to the intended recipient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Brute force attack

A

A password cracking attack in which the attacker attempts to guess passwords by using a cracking tool that submits every possible letter, number, and symbol combination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Dictionary attack

A

A password cracking attack in which the attacker uses a list of words and phrases to guess the decryption key.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

MAC spoofing

A

A network attack in which the MAC address of the hacker’s computer is changed to match the network’s gateway and overwrite the switch’s CAM table to intercept all communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Zero-day attack

A

Any attack that exploits a vulnerability that the developer is not aware of yet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Operating system end of life

A

An operating system that is no longer supported by the vendor.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Bring Your Own Device (BYOD)

A

A policy that allows users to use their own personal devices for work purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Whaling

A

A spear phishing attack that is designed to target a high-level employee, such as a CEO.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

SYN flood

A

The attacked sends a bunch of SYN packets with a spoofed IP address. When the target responds with the SYN-ACK packet, it sends it to the wrong IP address, which means no response will come back. The target eventually gets overwhelmed waiting for the response packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Amplification attack

A

Consumes the bandwidth between the target and the internet, effectively cutting them off. DNS amplification attacks are a common example of this. Basically, the attacker sends a large amount of DNS queries to multiple open DNS servers with the victim’s IP address spoofed as the sender. The DNS servers will send the DNS responses back to the victim, which can quickly overload them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

IP address spoofing

A

The attacker modifies his computer with an IP address that matches the IP address of a device on the network. The packets go to the attacker’s computer instead of to a server as the sender intended.

24
Q

DNS spoofing

A

The attacker modifies a website’s address in the DNS server. When the user attempts to go to that website, the browser redirects the user to the attacker’s malicious site.

25
Q

HTTPS spoofing

A

The attacker uses a website name that looks similar to a real site. For example, www.testout.com is replaced with www.test0out.com.

26
Q

SSL hijacking

A

The attacker passes forged authentication keys to both the user and application/server. The user and application think they are talking to each other, but all communication is going through the attacker.

27
Q

Email hijacking

A

The attacker compromises the target’s email account to monitor and gather information.

28
Q

Wi-Fi eavesdropping

A

This is also known as a evil-twin attack. The attacker tricks users into connecting to a malicious wireless network. The attacker then monitors and manipulates the data packets flowing across the wireless network.

29
Q

Session hijacking

A

When a user logs into a website, a session cookie is generated. If the attacker intercepts this data, the attacker can access the user’s account.

30
Q

Password spraying

A

Instead of attempting multiple logins using a single user account and different passwords, the attacker uses the same passwords with multiple user accounts.

31
Q

High-level format

A

Formatting method that removes the pointers to the data on the drive, but not the data on the drive. The high-level format is the standard format that’s done through the operating system tools.

32
Q

Low-level format

A

Formatting method that writes new sectors and tracks to the drive and is typically done by the manufacturer when the drive is first assembled.

33
Q

Degaussing

A

Hard drive destruction method that purges the entire hard disk all at once by exposing it to an extremely strong magnetic pulse.

34
Q

Certificate of destruction (COD)

A

Document that details the method and date of a hard drive’s destruction along with the chain of custody.

35
Q

Virus

A

Self-replicating malware that attaches in a legitimate program and hides there. When the program runs, the virus payload is also executed.

36
Q

Boot-sector virus

A

A virus that injects itself in the boot sector and moves the Master Boot Record to another location on the hard drive. The virus then always executes before the MBR.

37
Q

Trojan Horse

A

Malware that provides a hacker covert remote access to the victim’s system.

38
Q

Keylogger

A

Malware that logs every keystroke the user makes and then sends the report back to the hacker.

39
Q

Spyware

A

Malware that monitors and logs a user’s activity on the device. This includes web browsing, applications, instant messaging, etc.

40
Q

Ransomware

A

Malware that scans the system for user files and encrypts them. To regain access to files, the victim must pay a ransom.

41
Q

Cryptominer

A

Malware that uses the victim computer’s resources to mine for cryptocurrency on behalf of the hacker.

42
Q

Rootkit

A

Malware that consists of programs that can give the hacker root (administrator) access to the target machine.

43
Q

Malware definitions

A

A unique fingerprint for each discovered malware. Anti-malware programs keep a database of definitions to detect and remove malware.

44
Q

Sheep-dip computer

A

A special computer that is setup for malware analysis and remediation.

45
Q

Windows Pre-Installation Environment (WinPE)

A

A lightweight version of Windows that boots from the USB drive and is typically used to help deploy Windows in an enterprise environment or for troubleshooting Windows issues.

46
Q

Sheep dip computer

A

A computer that is isolated from any networks, and it has port monitors, file monitors, network monitors, and anti-malware software installed. This system would only connect to a network under extremely strict conditions.

47
Q

Firewall

A

A device or software that inspects network traffic based on a set of rules.

48
Q

Network appliances

A

Devices that exist on a network to provide certain services for that network.

49
Q

Intrusion detection system (IDS)

A

A feature that detects intrusion attempts and alerts the system administrator.

50
Q

Intrusion prevention system (IPS)

A

A feature that detects intrusions and takes actions to prevent it, including reporting, blocking, or dropping traffic when intrusions occur.

51
Q

Access Control List (ACL)

A

A mechanism used to define and enforce rules about who (or what) can access resources in a system and what actions they can perform.

52
Q

Packet filtering

A

This is one of the most common types of firewalls. It scans all packets and reads the source and destination IP addresses along with their port numbers. Based on the ACL, the firewall will reject any packet that does not belong to that network.

53
Q

Circuit layer gateway

A

This gateway scans the traffic based on TCP or UDP transmission. If the transmission is detected as legitimate, the packet is granted access while the link remains established.

54
Q

Application level gateway

A

This gateway monitors the contents of the packet. Each packet has information about the application that uses the data. The ACL will then dictate whether that data will be denied or allowed based on the application.

55
Q

Unified Threat Management

A

An all-in-one solution for multiple network appliances. A UTM can help alleviate budget constraints and physical space.

Keep in mind:
The disadvantage is that a UTM can suffer from connectivity issues and be a single point of failure.

56
Q

Endpoint management server

A

A way to keep track of various devices while ensuring that software is secure. Many companies that need small IT department overhead use this option.