Chapter 7: Protecting Against Advanced Attacks Flashcards

1
Q

A ____ attack is an attack launched from a single system and attempts to disrupt services.

A

DoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

____ attacks are DoS attacks from multiple computers. DDoS attacks typically include sustained, abnormally high network traffic.

A

DDoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_____ attacks attempt to impersonate another system.

A

Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

MAC address spoofing changes the ___ ___ ____ and IP spoofing changes the ____ ____ ____.

A

source MAC address

source IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

____ ____ attacks attempt to mislead computers or switches about the actual MAC address of a system. They can be used to launch a man-in-the-middle attack.

A

ARP poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

____ ____ attacks modify DNS data and can redirect users to malicious sites. Many DNS servers use DNSSEC to protect DNS records and prevent these attacks.

A

DNS poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

____attacks send increased traffic to, or request additional traffic from, a victim.

A

Amplification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_____ attacks attempt to discover passwords.

A

Password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A _____ ____ attack attempts to guess all possible character combinations and a _____ attack uses all the words and character combinations stored in a file.

A

brute force

dictionary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

____ ____ policies thwart online brute force attacks and complex passwords thwart offline password attacks.

A

Account lockout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Passwords are often stored as a____. Weak hashing algorithms are susceptible to collisions, which allow different passwords to create the same hash.

A

hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

In a ___ ___ ___ attack, the attacker discovers the hash of the user’s password and then uses it to log on to the system as the user.

A

pass the hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

In a____ attack, an attacker is able to create a password that produces the same hash as the user’s actual password. This is also known as a hash collision.

A

birthday

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A ____ ____ occurs when the hashing algorithm creates the same
hash from different passwords.

A

hash collision

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Password_____ adds additional characters to passwords before hashing them and prevents many types of attacks, including dictionary, brute force, and rainbow table attacks.

A

salting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

____attacks capture data in a session with the intent of using information to impersonate one of the parties. Timestamps and sequence numbers thwart these attacks.

A

Replay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A known plaintext attack is possible if an attacker has both the _____ and the ____ created by encrypting the plaintext. It makes it easier to decrypt other data using a similar method.

A

plaintext and the ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Attackers buy domain names with minor typographical errors in ____ ____(also called URL hijacking) attacks. The goal is to attract traffic when users enter incorrect URLs. Attackers can configure the sites with malware to infect visitors or configure the site to generate ad revenue for the attacker.

A

typo squatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

____tricks users into clicking something other than what they think they’re clicking.

A

Clickjacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Attackers utilize the user’s session ID to ____ the user in a session ID attack.

A

impersonate

21
Q

____ ____ attacks allow an attacker to change the registration
of a domain name without permission from the owner.

A

Domain hijacking

22
Q

A ___-___-___-____ is a proxy Trojan horse that exploits vulnerable web browsers. When successful, it allows attacks to capture keystrokes and all data sent to and from the browser.

A

man-in-the-browser

23
Q

A ____ ____ is additional code that can be run instead of the original driver.

A

driver shim

24
Q

Attackers exploiting unknown or undocumented vulnerabilities are taking advantage of ___-____ vulnerabilities. The vulnerability is no longer a ___-____ vulnerability after the vendor releases a patch to fix it.

A

zero-day

25
Q

____ ____ occur when an application receives more data, or unexpected data, than it can handle and exposes access to system memory. Integer overflow attacks attempt to use or create a numeric value bigger than the application can handle.

A

Buffer overflows

26
Q

Buffer overflow attacks exploit buffer overflow vulnerabilities. A common method uses NOP instructions or NOP sleds such as a string of ___ commands. Two primary protection methods against buffer overflow attacks are ____ ____ and keeping a system ___ ___ ___.

A

x90

input validation and keeping a system up to date

27
Q

____ code has been optimized by an application and converted into an executable file.____ code is code that is evaluated, interpreted, and executed when the code is run.

A

Compiled

Runtime

28
Q

A common coding error in web-based applications is the lack of ____ ____.

A

input validation

29
Q

____ ____ checks the data before passing it to the application and prevents many types of attacks, including buffer overflow, SQL injection, command injection, and cross-site scripting attacks.

A

Input validation

30
Q

___-____ input validation is the most secure.

A

Server-side

31
Q

Attackers can bypass ___-____ input validation, but not server-side input validation.

A

client-side

32
Q

____ conditions allow two processes to access the same data at the same time, causing inconsistent results. Problems can be avoided by locking data before accessing it.

A

Race

33
Q

____-_____ routines within applications can prevent application failures and protect the integrity of the operating systems. Error messages shown to users should be generic, but the application should log detailed information on the error.

A

Error-handling

34
Q

___ ____ uses a digital signature within a certificate to authenticate and validate software code.

A

Code signing

35
Q

Code ___ and ____ techniques include static code analysis, dynamic analysis (such as fuzzing), stress testing, sandboxing, and model verification.

A

quality and testing

36
Q

Software development life cycle (SDLC) models provide structure for software development projects._____ uses multiple stages with each stage feeding the next stage._____ is a more flexible model and it emphasizes interaction with all players in a project.

A

Waterfall

Agile

37
Q

Secure DevOps is an____-aligned methodology. It stresses security throughout the lifetime of the project.

A

agile

38
Q

Common web servers are Apache (running on ____) and Internet Information Services (running on _____ servers).

A

Linux

Microsoft

39
Q

Databases are optimized using a process called ______. A database is considered normalized when it conforms to the first three normal forms.

A

normalization

40
Q

___ ____ attacks provide information about a database and can allow an attacker to read and modify data within a database. Input validation and stored procedures provide the best protection against these attacks.

A

SQL injection

41
Q

___-___ ___ allows an attacker to redirect users to malicious web sites and steal cookies. It uses HTML and JavaScript tags with < and > characters.

A

Cross-site scripting (XSS)

42
Q

___-____ ___ ___ causes users to perform actions on web sites without their knowledge and allows attackers to steal cookies and harvest passwords.

A

Cross-site request forgery (XSRF)

43
Q

___ and ___ attacks are mitigated with input validation techniques.

A

XSS and XSRF

44
Q

_____ are references that provide a foundation. They typically use a structure of basic concepts and provide guidance on how to implement security.

A

Frameworks

45
Q

_____ frameworks are based on relevant laws and regulations. A non-regulatory framework is not required by any law.

A

Regulatory

46
Q

Some frameworks are used within a single country (and referred to as ____ frameworks), while others are used internationally.

A

national

47
Q

Some frameworks only apply to certain industries. As an example, organizations that handle credit cards typically comply with the ___ ___ ___ ___ ___ ___.

A

Payment Card Industry Data Security Standard (PCI DSS)

48
Q

____-specific guides should be used when configuring specific systems.

A

Vendor