comptia Flashcards
Vishing
Social engineering over telephone
Phishing
Fraud Attack to obtain information, e.g through email prompting users to do something
Watering hole attack
infecting websites a group of people access to obtain specific information, targeted attack
scarcity
business choices to manage the availability of resources to meet human needs
bluesnarfing
Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection
DoS Attack
denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.
- Ping of death
- buffer overflow
- IP Spoofing
- consumes bandwidth
A sacrificial server on a network to gather
information about intruders. What is this called?
Honeypot
A policy that only allows compliant devices to join their network.
Quarantine Network
What type of firewall inspects packets to identify VALID communications?
Stateful Inspection Firewall
All viruses are malware - TRUE?
Yes
acronym which describes the duration after which an organisation’s viability
will be permanently threatened, if product and service delivery CANNOT be
resumed?
MTPOD (Maximum tolerable period of disruption)
measure of the maintainability of repairable items. It represents the average time required to repair a failed component or device
MTTR (mean-time to repair)
the interval of time that might pass during a disruption before the quantity of data lost during that period exceeds the Business Continuity
RPO (Recovery Point Objective)
the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in continuity.
RTO (Recovery Time Objective)
Which protocol can automatically provide the IP address, subnet mask, default
gateway IP and DNS server IP to a client on a data network?
DHCP
Which feature prevents infected files being installed on a device?
Driver Signature Enforcement
What is used to encrypt files on Microsoft
EFS (Encryption file system)
A network engineer monitors a firewall and notices several suspicious packets have
been dropped. What is in place on the firewall?
IPS
security protocol and is also one of the
secure encryption systems used in data communication?
Kerberos
Which type of tool is used to find modems on networks to initiate an attack from?
War-Dialler
NIDS
Network - Intrusion Detection System
Short for network intrusion detection system, NIDS is a system that attempts to detect hacking activities, denial of service attacks or port scans on a computer network or a computer itself. … The NIDS can monitor incoming, outgoing, and local traffic.
NTFS
journaling file system developed by Microsoft
a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed
Replay Attack
alters the communications between two parties who believe that they are directly communicating with each other.
MITM Attack
Which of the following attacks relies on intercepting and altering data sent between two networked hosts?
MITM attack
A type of exploit that relies on overwriting contents of memory to cause unpredictable results in an application is known as
Buffer Overflow
is a type of malicious exploit of a website where unauthorized commands are transmitted from a user that the web application trusts.
Cross-site request forgery (CSRF/XSRF)
Which type of attack allows for tricking a user into sending unauthorized commands to a web application?
(CSRF/XSRF)
3 privilege escalation attacks?
- System/application vulnerability
- Social engineering techniques
- System/application misconfiguration
a technique by which an attacker sends Address Resolution Protocol messages onto a local area network.
ARP spoofing or ARP poisoning
Which of the attack types listed below relies on the amplification effect?
DDOS attack
a computer security exploit that takes advantage of vulnerabilities in a user’s web browser application?
MITB
A technique that allows an attacker to authenticate to a remote server without extracting a cleartext password from the digest and use the digest instead of a password credential is known as:
Pass The hash
In a session hijacking attack, a hacker takes advantage of the session ID stored in:
Cookie
A situation in which an application writes to an area of memory that it is not supposed to access is referred to as:
Buffer Overflow
Which of the terms listed below describes a programming error where an application tries to store a numeric value in a variable that is too small to hold it?
Integer Overflow
an application fails to properly release memory allocated to it or continually requests more memory than it needs
Memory Leak
The purpose of a downgrade attack is to make a computer system fall back to a weaker security mode which makes the system more vulnerable to attacks. True or False?
True
precompiled functions designed to be used by more than one Microsoft Windows application simultaneously to save system resources
DLL (Dynamic-link library)
Which of the following terms describes an attempt to read a variable that stores a null value?
Pointer Deference
Which of the terms listed below describes a type of attack that relies on executing a library of code?
DLL Injection
True or False, System sprawl is used to describe one of the aspects of poor asset management process.
True
Which of the following violates the principle of least privilege?
Improperly Configured Accounts
Resource exhaustion is considered successful in which attack?
DoS attack
After feeding an input form field with incorrect data, a hacker gets access to debugger info providing extensive description of the error. This situation is an example of:
Improper error Handling
Ports 20/21
FTP
Port 22
SSH
Port 25?
SMTP
Port 53
DNS
POP2 / POP3 Ports?
109/110
SFTP port
115
Port 123
NTP
IMAP ver3 port?
220
Port 23
Telnet
HTTP port?
Port 80
TFTP port?
Port 69
SNMP port?
Port 161
LDAP port?
Port 389
HTTPS port?
443
DHCP port?
67
A malfunction in preprogrammed sequential access to a shared resource is described as
Race Condition
Backdoor
Using tools to examine the internal operations of a program
Which type of attack denies authorised users access to network resources?
DoS
Which Type of attack uses more than one computer to attack the victims
DDos Attack
An alert signals you that a server in your network has a program running on it that bypasses authorisation . Which type of attack has occurred
Backdoor
You’ve discovered an expired certificate is being used repeatedly to gain logon privileges. What type of attack is this?
Replay Attack