Common Security Threats Flashcards

1
Q

Which of the following is not a motivation of malicious actors?

A

Bug bounty awards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is considered a type of DDoS attack?

A

Directed, Reflected, Geopolitical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why is UDP the “protocol of choice” for reflected DDoS attacks?

A

UDP is much more easily spoofed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the main leverage in social engineering?

A

Human nature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are some forms of social engineering?

A

Phone scams, Phishing, Malvertising

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name some forms that are valid defenses against social engineering?

A

Two-factor authentication, Information classification, Physical security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which tool provides the most granular information to help in the identification of malware?

A

Packet capture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

NetFlow provides which of the following?

A

Information on the type of traffic traversing the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What can be used for identification of malware on the network?

A

NetFlow, IPS events, Packet captures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which type of data is often attractive to malicious actors?

A

Personally identifiable information (PII), Credit card data, Intellectual property (IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly