Chapter 2: Threats, Vulnerabilities and Mitigations Flashcards

1
Q

Logic Bomb

A

a string of malicious code intentionally inserted into a program to cause harm to a network when it meets certain conditions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Trojan Horse

A

a type of malware that disguises itself as a legitimate program to trick users into downloading and installing it on their computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Rootkit

A

a type of malware that gives cybercriminals unauthorized access to a computer or network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Worm

A

a type of malicious software (malware) that can self-replicate and spread rapidly across a network without any user interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

WPA3

A
  • Wi‐Fi Protected Access 3 (WPA‐3) is the most modern, most secure option
  • Uses Simultaneous Authentication of Equals (SAE) instead of WPA2’s Pre-Shared Key (PSK). SAE is more secure and protects against offline dictionary attacks and password guessing attacks.
  • encrypts each device’s data individually, which improves privacy and security.

https://www.securew2.com/wp-content/uploads/2023/08/Design-the-WPA2-Vs-802.1-X-Image.png

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WPA2

A
  • WPA2 is vulnerable to WEP attacks if the router is compatible with WEP systems.
  • uses the Advanced Encryption Standard (AES), which is considered one of the most complex encryption technologies available. AES is used by the US government to protect classified data.

https://www.securew2.com/wp-content/uploads/2023/08/Design-the-WPA2-Vs-802.1-X-Image.png

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cross-site Scripting

A

Cross‐site scripting (XSS) involves entering a script into text areas that other users will view.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SQL Injection

A

a common attack vector that uses malicious SQL code for backend database manipulation to access information that was not intended to be displayed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

On-path attack

A

a cyberattack where an attacker secretly intercepts and modifies communication between two parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a motivation for a Nation-state actor?

A

Nation‐state actors are typically advanced persistent threats (APTs) and their motivations commonly include espionage, data exfiltration, disruption/chaos, and war. Financial gain is more commonly associated with organized crime, blackmail with insider threats, and ethical with hacktivists.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Spear Phishing

A

a type of phishing attack that targets a specific individual, group or organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Bloatware

A

Unwanted or hidden software installed by the manufacturer or vendor on a new computer, device, or application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Vishing

A

a cyberattack that involves tricking people into giving away sensitive information over the phone.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Smishing

A

a type of cybercrime that uses deceptive text messages to trick people into sharing sensitive information or performing actions that compromise their security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Pretexting

A

creating a fake scenario to trick a victim into giving away sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Business email compromise (BEC)

A

tricking people into sending money or sharing sensitive information through email.

17
Q

Typo squatting

A

a form of cybersquatting (sitting on sites under someone else’s brand or copyright) that targets Internet users who incorrectly type a website address into their web browser

18
Q

HIDS

A

a cybersecurity tool that monitors a computer’s internal systems and network packets for suspicious activity.

19
Q

HIPS

A

which is a security tool that monitors and prevents threats to a computer system.

20
Q

On-Path Attack

A

a cyberattack where a malicious actor intercepts and modifies communication between two parties.

21
Q

Least Privilege Access

A

a cybersecurity strategy that limits user access to only what is needed to perform their job.

21
Q

Watering Hole Attack

A

a cyberattack that infects a website that a target group frequently visits with malware, which then infects the target’s computer.

22
Q

RDP (Remote Desktop Protocol)

A

Microsoft protocol that allows users to remotely access a Windows computer from another device.

23
Q

NTLM (Network Trust Level Manager)

A

a Microsoft security protocol suite that authenticates users in a network environment.

24
Q

Birthday attack

A

a cryptographic attack that uses the birthday problem in probability theory to find collisions in hash functions.

25
Q
A