Chapter 6 - Threats And Attacks Flashcards

1
Q

What is an example of a passive attack?

A

Eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Define a passive attack.

A

A type of attack where the attacker intercepts data without altering it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True or False: Passive attacks modify data during interception.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Fill in the blank: Passive attacks involve _______ data without the user’s knowledge.

A

intercepting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is not an example of a passive attack? A) Eavesdropping B) Data modification C) Traffic analysis D) None of the above

A

B) Data modification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What information is gathered in a packet sniffing passive attack?

A

Login info, session details, and unencrypted data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Software Metering Tool?

A

restricts applications on network from running if not approved by LAN Administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are some of Risks associated with Cloud Services?

A

1.Misconfiguration
2. Unauthorized Access
3. Data Breaches
4. Insecure interfaces
5. Account hijacking
6. Unmanaged attack surface
7. Human error
8. Inadequate Change control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What do Cross sites scripts target vs SQL Injections

A

Cross - websites
SQL - WEB Applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Does a Lan network cost a lot to install and take a lot time?

A

Low cost and low time to install

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What logs are vulnerable to eavesdropping?

A

System logs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a combination of two doors that prevents unauthorized access?

A

Deadman door

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What cybersecurity threats that may target a broad range of users, organizations, or industries

A

Threat landscape

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What protects external network access points by identifying and notifying admin of suspicious data requests

A

Intrusion detection systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly