Common Security Threats Flashcards
Which of the following is not a motivation of malicious actors?
Bug bounty awards
What is considered a type of DDoS attack?
Directed, Reflected, Geopolitical
Why is UDP the “protocol of choice” for reflected DDoS attacks?
UDP is much more easily spoofed
What is the main leverage in social engineering?
Human nature
What are some forms of social engineering?
Phone scams, Phishing, Malvertising
Name some forms that are valid defenses against social engineering?
Two-factor authentication, Information classification, Physical security
Which tool provides the most granular information to help in the identification of malware?
Packet capture
NetFlow provides which of the following?
Information on the type of traffic traversing the network
What can be used for identification of malware on the network?
NetFlow, IPS events, Packet captures
Which type of data is often attractive to malicious actors?
Personally identifiable information (PII), Credit card data, Intellectual property (IP)