Chapter 9 Review Flashcards
A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company’s servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company.
What kind of attack is this?
Insider threat
What type of DoS attack orchestrates an attack using uninfected computers?
DRDoS (Distributed Reflection DoS) attack
Which of the following is considered a secure protocol?
SSH
Which kind of attack simulation detects vulnerabilities and attempts to exploit them?
Penetration testing
A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers in order to collect information from people who make the same typo. What kind of attack is this?
Phishing
A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project’s team members. What type of document should they use?
NDA
Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct in order to make recommendations for the upgrade priorities?
Posture assessment
Which of these attacks is a form of Wi-Fi DoS attack?
Deauthentication attack
Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1,2000. What type of threat was this?
Logic bomb
A spoofed DNS record spreads to other DNS servers. What is this attack called?
DNS poisoning