Common Network Security Threats Flashcards
Which type of threat actor promotes an ideology and does not normally conceal their malicious activities?
Instruction: Choose the option that best answers the question.
Answer Choices
Script kiddie
Hacktivist
Nation-state
Organized crime
Hacktivist
How are CVEs named?
Instruction: Choose the option that best answers the question.
Answer Choices
Year-CVE-item_that_year
CVE-item_that_year
Year-CVE
CVE-year-item_that_year
CVE-year-item_that_year
What is the primary incentive for bug bounty hunters?
Instruction: Choose the option that best answers the question.
Answer Choices
Espionage
Peer recognition
Financial gain
Promotion of ideology
Financial gain
What can be done to mitigate buffer overflow attacks?
Instruction: Choose all options that best answer the question.
Answer Choices
Enable OSI model monitoring
Install a host-based firewall
Admins must ensure the latest software patches have been applied
Programmers must ensure all user-supplied data is validated
Admins must ensure the latest software patches have been applied
Programmers must ensure all user-supplied data is validated
What is the result of a SYN flood attack?
Instruction: Choose the option that best answers the question.
Answer Choices
Multiple buffer overflows on the server
Multiple half-open connections on the server
Multiple closed sessions on the server
Multiple injection attacks on the server
Multiple half-open connections on the server
When should an Internet user VPN app be used instead of the Tor browser?
Instruction: Choose the option that best answers the question.
Answer Choices
When the user needs to access a corporate point-to-site VPN over the Internet
When only web browsing must be anonymized over the network
When all device access must be anonymized over the network
When the user needs to access a corporate site-to-site VPN over the Internet
When all device access must be anonymized over the network
Which indicators are commonplace with a DDoS attack?
Instruction: Choose all options that best answer the question.
Answer Choices
Encrypted data files
Numerous connection requests from the same groups of IPs in a short time frame
Sensitive data exfiltration
Abnormally high level of network traffic
Numerous connection requests from the same groups of IPs in a short time frame
Abnormally high level of network traffic
What can be done to harden a Wi-Fi network?
Instruction: Choose all options that best answer the question.
Answer Choices
Disable SSID broadcasting
Disable MAC address filtering
Enable SSID broadcasting
Enable MAC address filtering
Disable SSID broadcasting
Enable MAC address filtering
Which attributes define an Advanced Persistent Threat (APT)?
Instruction: Choose all options that best answer the question.
Answer Choices
Multiple half-open server connections
Encryption of data files
Backdoor access to a compromised system for a long period of time
Highly skilled attacker
Backdoor access to a compromised system for a long period of time
Highly skilled attacker
How many MITRE attack categories are there?
Instruction: Choose the option that best answers the question.
Answer Choices
6
14
16
5
14
Which OWASP Top 10 item related to the violation of the principle of least privilege?
Instruction: Choose the option that best answers the question.
Answer Choices
Insecure design
Broken access control
Injections
Cryptographic failures
Broken access control