Chapter 9 Review Flashcards

1
Q

A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company’s servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company.
What kind of attack is this?

A

Insider threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of DoS attack orchestrates an attack using uninfected computers?

A

DRDoS (Distributed Reflection DoS) attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is considered a secure protocol?

A

SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which kind of attack simulation detects vulnerabilities and attempts to exploit them?

A

Penetration testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers in order to collect information from people who make the same typo. What kind of attack is this?

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project’s team members. What type of document should they use?

A

NDA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct in order to make recommendations for the upgrade priorities?

A

Posture assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of these attacks is a form of Wi-Fi DoS attack?

A

Deauthentication attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1,2000. What type of threat was this?

A

Logic bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A spoofed DNS record spreads to other DNS servers. What is this attack called?

A

DNS poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly