Cisco 2 Flashcards

1
Q

usually introduced by errors in the operating system or application code, despite all the effort companies put into finding

A

Software vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • are often introduced by hardware design flaws. RAM memory for example, is essentially capacitors installed very close to one another. It was discovered that, due to proximity, constant changes applied to one of these capacitors could influence neighbor capacitors.
  • are specific to device models and are not generally exploited through random compromising attempts
A

Hardware vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Categorizing Security Vulnerabilities

A
  1. buffer flow
  2. non-validated input
  3. race conditions
  4. weakness in security practices
  5. access-control problems
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

his vulnerability occurs when data is written beyond the limits of a buffer. Buffers are memory areas allocated to an application.

A

Buffer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Programs often work with data input. This data coming into the program could have malicious content, designed to force the program to behave in an unintended way

A

Non-validated input

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • Systems and sensitive data can be protected through techniques such as authentication, authorization, and encryption.
  • Developers should not attempt to create their own security algorithms because it will likely introduce vulnerabilities.
  • It is strongly advised that developers use security libraries that have already created, tested, and verified.
A

weaknesses in security practices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This vulnerability is when the output of an event depends on ordered or timed outputs. A race condition becomes a source of vulnerability when the required ordered or timed events do not occur in the correct order or proper timing.

A

Race conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

process of controlling who does what and ranges from managing physical access to equipment to dictating who has access to a resource, such as a file, and what they can do with it, such as read or change the file. Many security vulnerabilities are created by the improper use of access controls.

A

Access-control problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Types of Malware

A
  1. spyware
  2. adware
  3. bot
  4. ransomware
  5. scareware
  6. rootkit
  7. trojan horse
  8. worms
  9. man-in-the-middle
  10. man-in-the-mobile
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • This malware is design to track and spy on the user.
  • often includes activity trackers, keystroke collection, and data capture. In an attempt to overcome security measures, spyware often modifies security settings.
A

Spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • dvertising supported software is designed to automatically deliver advertisements.
  • is often installed with some versions of software.
  • designed to only deliver advertisements but it is also common for adware to come with spyware.
A

Adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

From the word robot, a bot is malware designed to automatically perform action, usually online. While most bots are harmless, one increasing use of malicious bots are botnets.

A

Bot

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This malware is designed to hold a computer system or the data it contains captive until a payment is made

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

his is a type of malware designed to persuade the user to take a specific action based on fear.

A

Scareware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This malware is designed to modify the operating system to create a backdoor. Attackers then use the backdoor to access the computer remotely

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

malicious executable code that is attached to other executable files, often legitimate programs

A

Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

malware that carries out malicious operations under the guise of a desired operation. This malicious code exploits the privileges of the user that runs it

A

Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

malicious code that replicate themselves by independently exploiting vulnerabilities in networks

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

allows the attacker to take control over a device without the user’s knowledge. With that level of access, the attacker can intercept and capture user information before relaying it to its intended destination.

A

Man-In-The-Middle (MitM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

type of attack used to take control over a mobile device. When infected, the mobile device can be instructed to exfiltrate user-sensitive information and send it to the attackers.

A

Man-In-The-Mobile (MitMo)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

two categories of malware

A
  1. infectious methods
  2. malware actions
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

infectious methods

A
  1. worms
  2. virus
  3. trojan
  4. bots
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

malware on basis of actions

A
  1. adware
  2. ransomware
  3. spyware
  4. scareware
  5. rootkits
  6. zombies
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

they dont steal or spy but wait for instructions from hackers

A

zombies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Symptoms of Malware

A
  • There is an increase in CPU usage.
  • There is a decrease in computer speed.
  • The computer freezes or crashes often.
  • There is a decrease in Web browsing speed.
  • There are unexplainable problems with network connections.
  • Files are modified.
  • Files are deleted.
  • There is a presence of unknown files, programs, or desktop icons.
  • There are unknown processes running.
  • Programs are turning off or reconfiguring themselves.
  • Email is being sent without the user’s knowledge or consent.
26
Q

access attack that attempts to manipulate individuals into performing actions or divulging confidential information

A

Social Engineering

27
Q

This is when an attacker calls an individual and lies to them in an attempt to gain access to privileged data.

A

Pretexting

28
Q

This is when an attacker quickly follows an authorized person into a secure location.

A

Tailgating

29
Q

This is when an attacker requests personal information from a party in exchange for something, like a free gift.

A

Something for Something (Quid pro quo)

30
Q

process of discovering the password used to protect a wireless network

A

Wi-Fi Password Cracking

31
Q

The attacker manipulates a person who knows the password into providing it.

A

Social engineering

32
Q

social engineering types

A
  1. pretexting
  2. tailgating
  3. something for something (Quid pro quo)
33
Q

The attacker tries several possible passwords in an attempt to guess the password. If the password is a 4-digit number, for example, the attacker would have to try every one of the 10000 combinations.

A

Brute-force attacks

34
Q

By listening and capturing packets sent on the network, an attacker may be able to discover the password if the password is being sent unencrypted (in plain text

A

Network sniffing

35
Q

Wi-Fi Password Cracking types

A
  1. Social engineering
  2. Brute-force attacks
  3. Network sniffing
36
Q

when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source.

A

Phishing

37
Q
  • highly targeted phishing attack
  • emails are customized to a specific person
A

Spear phishing

38
Q

common method for exploiting vulnerabilities

A
  1. Gather information about the target system
  2. One of the pieces of relevant information learned in step 1 might be the operating system
  3. the attacker looks for any known vulnerabilities specific to that version of OS or other OS services.
  4. hen a vulnerability is found, the attacker looks for a previously written exploit to use
39
Q

They consist of a multi-phase, long term, stealthy and advanced operation against a specific target.

A

advanced persistent threats (APTs)

40
Q

a public Internet database containing information about domain names and their registrants.

A

whois

41
Q
  • a popular port scanner
  • With a port scanner, an attacker can probe ports of a target computer to learn about which services are running on that computer.
A

nmap

42
Q
  • attacks are a type of network attack
  • results in some sort of interruption of network service to users, devices, or applications.
A

Denial-of-Service (DoS

43
Q

This is when a network, host, or application is sent an enormous quantity of data at a rate which it cannot handle

A

Overwhelming Quantity of Traffic

44
Q

his is when a maliciously formatted packet is sent to a host or application and the receiver is unable to handle it.

A

Maliciously Formatted Packets

45
Q
  • when single host attacks
  • maliscious attempt by a single person of group of people to cause deny of service to customers
A

DOS

46
Q

when multiple hosts attack simultaneously

A

DDOS

47
Q

An attacker builds a network of infected hosts

A

botnet

48
Q

The infected hosts are called

A

zombies

49
Q

types of DOS attacks

A
  1. penetration
  2. eavesdropping
  3. man-in-the-middle
  4. flooding
50
Q
  • attacker gets inside your machine
  • take over machine and do whatever he wants
  • achieves entry via software, stolen password
A

penetration

51
Q
  • attacker gains access to same network
  • listens to traffic going in and out
A

eavesdropping

52
Q
  • attacker listens in input/output
  • can substitute messages in both directions
A

man-in-the-middle

53
Q
  • attacker sends overwhelming number of messages; great congestion
A

flooding

54
Q

how to defend from DOS

A
  1. firewall
  2. router
  3. switches
55
Q

prevent users from launching simple flooding type attacks from machines behind firewall

A

firewall

56
Q

provide automatic and/or system wide rate limiting, traffic shaping, delayed binding to detect and remediate denial of service attacks

A

switch

57
Q

add rules to take flow statistics out of router duing DOS attacks, they further slowdown and complicate the matter

A

router

58
Q

DDS based defense

A
  1. clean pipes
  2. nothing can be done to entirely prevent DOS
  3. minimize dangers
59
Q

While many legitimate companies specialize in optimizing websites to better position them, a malicious user could use this to make a malicious website appear higher in search results.

A

SEO Poisoning

60
Q

attacks that use multiple techniques to compromise a target. By using several different attack techniques at once, attackers have malware that are a hybrid of worms, Trojan horses, spyware, keyloggers, spam and phishing schemes.

A

Blended attacks

61
Q

important measures a company should take when a security breach is identified

A
  1. Communicate the issue
  2. Be sincere and accountable in case the company is at fault.
  3. Provide details.
  4. Understand what caused and facilitated the breach.
  5. Apply what was learned from the forensics investigation
  6. Ensure all systems are clean
  7. Educate