Client Side attacks PEs Flashcards
_______________ is considered the most successful and sought out method to exploit a target.
Social Engineering
________________ is when an individual is manipulated to perform an action or reveal information that may compromise a target.
Social Engineering
_______________is a form of attack in which untrusted Javascript is injected into a trusted website.
Cross-Site Scripting
True/False Attackers are rarely successful with client side attacks because of the limited number of configuration variables as well as the low amount of user interaction.
False
____________ means that a user’s SQL input or data is checked for items that might harm the database.
Sanitized
What type of attack is initiated when the victim downloads content from the attacker.
Client Side
____________ checks inputs to ensure that it meets a criteria.
Validation
What is the target of an XSS:
Visitor’s browser
What are the two types of XSS?
Reflected and Stored
When the code of the targeted file is replaced with the infected code, this is known as:
Overwriting
What may store information pertaining to a session and track client’s other personal data?
Cookies
Viruses have a naming convention, established by Symantec, that involves alphanumeric characters, underscores, spaces. Each section is limited to how many characters?
20
True/False Social engineering occurs when a malicious actor leverages access to a user’s session cookies in order to impersonate that user.
false
Determine whether the XSS method presented is reflected or stored: When the injected script is reflected off the web server.
Reflected
____________ is the use of Valid SQL Queries via input data fields or attaching queries to the end of URLs from client side to server side application which could allow data to be read or modified.
SQL Injection
Determine whether the given incident impacts Confidentiality, Integrity, or Availability: Details of a classified government project have been published online. The publisher claims the documentation was provided by an anonymous group of hackers.
Confidentiality
Determine whether the given incident impacts Confidentiality, Integrity, or Availability: A user has clicked on a malicious link and installed ransomware. The user is unable to access any files.
Availability
Determine whether the given incident impacts Confidentiality, Integrity, or Availability: An attacker successfully executes a denial-of-service attack against a company which employs 35 people.
Availability
Determine whether the given incident impacts Confidentiality, Integrity, or Availability: An authorized user is sharing information with a coworker who is not authorized to access that project.
Confidentiality
Determine whether the given incident impacts Confidentiality, Integrity, or Availability: An employee has modified company financial records to reflect losses for the quarter. The employee then forwards the altered documents to the finance department.
Integrity
Determine whether the given incident impacts Confidentiality, Integrity, or Availability: A hacker has altered financial records to commit fraud.
Integrity
Determine whether the given incident impacts Confidentiality, Integrity, or Availability: An attacker injects or executes arbitrary code on a client.
Integrity
Any software installed on the OS that causes damage, loss of resources, or exploits any programmable device, service, or network is known as what?
Malware
List the malware type that matches the definition: malware that performs malicious actions when opened by the user.
Virus
List the malware type that matches the definition: malware that encrypts files and demands a ransom to return the data to the user.
Ransomware
List the malware type that matches the definition: malware that masquerades as a harmless application. As a result, the user downloads and uses the application. Theft of personal data, device crashing, spy activities, or an attack could occur.
Trojan
List the malware type that matches the definition: A file that modifies other files through execution flow and/or attaching itself to the target file.
Virus
List the malware type that matches the definition: malware that replicates itself from machine to machine, and does not require user interaction to work.
Worm
List the malware type that matches the definition: malware that captures and transmits personal information, internet browsing, or communication habits to a designated location
Spyware