Chapter 6 - Threats And Attacks Flashcards
What is an example of a passive attack?
Eavesdropping
Define a passive attack.
A type of attack where the attacker intercepts data without altering it
True or False: Passive attacks modify data during interception.
False
Fill in the blank: Passive attacks involve _______ data without the user’s knowledge.
intercepting
Which of the following is not an example of a passive attack? A) Eavesdropping B) Data modification C) Traffic analysis D) None of the above
B) Data modification
What information is gathered in a packet sniffing passive attack?
Login info, session details, and unencrypted data
What is a Software Metering Tool?
restricts applications on network from running if not approved by LAN Administrator
What are some of Risks associated with Cloud Services?
1.Misconfiguration
2. Unauthorized Access
3. Data Breaches
4. Insecure interfaces
5. Account hijacking
6. Unmanaged attack surface
7. Human error
8. Inadequate Change control
What do Cross sites scripts target vs SQL Injections
Cross - websites
SQL - WEB Applications
Does a Lan network cost a lot to install and take a lot time?
Low cost and low time to install
What logs are vulnerable to eavesdropping?
System logs
What is a combination of two doors that prevents unauthorized access?
Deadman door
What cybersecurity threats that may target a broad range of users, organizations, or industries
Threat landscape
What protects external network access points by identifying and notifying admin of suspicious data requests
Intrusion detection systems