Comptia Security + Flashcards

1
Q

What is phishing ?

A

social engineering that mimics email to steal your information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is typosquatting and prepending of the Url ?

A

Hijacking of a url ( usually changes one one thing ) in the domain name or add onto the domains beginning . Prepending is adding onto the beginning. Typosquatting is changing the url name to make it seem believable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is pretexting?

A

Lying to gain information, this can be done via phone or email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is Pharming ?

A

A poisoned DNS that is combined with fishing that targets a group of people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Vishing/Smishing?

A

Voice and SMS phising

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is reconnoissance ?

A

Gathering information on victims

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is spear phishing ?

A

targeted phishing with inside information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is whaling ?

A

a phishing attack that attacks the CEO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is shoulder surfing ?

A

Looking over someones shoulder to gather information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Hoax in term of IT?

A

A threat that dosen’t actually exist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a waterhole attach and how do you prevent it ?

A

A water hole attack is a cyber attack that install malware from a third party organization. In order to prevent water hole attacks a company should use a next gen firewall and anti-malware/ Anti-virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does a mail gateway system prevent against spam email ?

A

The mail gate way acts as a firewall for incoming and outgoing emails filter to detect varied problems. It does this by identifying keywords and problematic know senders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a reverse DNS? and how does it help prevent spam?

A

The email server will look at the known IP address and see if it matches the sender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is tailgating?

A

using a authorized person to Gaining unauthorised access to a building

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an invoice scam?

A

An attack that is disguised as a Bill

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is credential harvesting?

A

An attacker is looking to find your sign-ins, this is done via malicious emails.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is a virus?

A

Malware that needs a human to download it to begin the replicating process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is a worm?

A

Malware that does not need a human to click on it before it begins replicating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is electing information tactic?

A

A person call and pretends to be from the help desk and convinces people to give information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is trojan Horse software?

A

A software that looks normal but has an ulterior motive to do bad or simple do nothing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a back door during malware?

A

A way for malware to reconnect to your system without having to go through the front door

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is RAT ( REMOTE ACESS TROJANS ) ?

A

A program that give a 3rd party full remote access over the operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a root kit and why is it so hard to get rid of ?

A

A type of malware that modifies the core system files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is crypto-malware?

A

Encryption that requires a key in order to use-crypt information. Victim must pay ransom in order to get the key .

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is Adware?

A

A malware attack that pop-ups ads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is a Botnet?

A

A group of computers that have been taken over to form a network of bots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is a Logic bomb?

A

A bomb that has been left to activate later, this is malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

what is pup malware? ( potential unwanted pop-up)

A

Any un wanted malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What is DDoS?

A

Distributed denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is a password Hash?

A

a string of text that is used to represent password data. Hash can not be reversed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is a Spraying attack?

A

trying to log in with common passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is a Brute force attack?

A

this type of attack tries every possible password combination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

what is a dictionary attack?

A

many common password wordlists are standard among people in a certain industry

34
Q

What is a rainbow table?

A

A table that has saved passwords and their hashes

35
Q

What is salt?

A

A salt is random data added to a password when hashing

36
Q

Why are malicious USB and Flash drivers known as HID ? and how do they attack the system?

A

They are known as Human interface Devices because they can begin typing w/o human interaction. They use that to there advantage to download malware onto computer. They can also have a keyboard logger .

37
Q

What is skimming?

A

copying data from magnetic stripe on credit cards

38
Q

What is a C2 server?

A

A c2 server is the mail tool cyber threat actors use to launch and control cyber attacks

39
Q

Why is it important to check data when inserting it into a machine learning program ?

A

The machine learning program is only as good as the data is. A poisoned data means weakness within the program

40
Q

What is supply chain security ?

A

Supply chain security is ensuring that there are polices and procedures in place to protect your network from other companies that work with yours.

41
Q

what is a hash collision ?

A

is when 2 pieces of different data share the same hash value 

42
Q

How do you avoid hash collision ?

A

Increasing the hash length decreases the chance of a collision happening

43
Q

What is the downgrade attack ?

A

A type of attack that is done during sending of data. This attacks causes systems to downgrade their security

44
Q

What is privildge escalation ?

A

An average user gains administer access to the operation system

45
Q

What is the difference between a vertical escalation and a horizontal escalation ?

A

In a vertical escalation a normal user is gaining administrative, while in a horizontal escalation user A is gaining access to user B

46
Q

What is data execution prevention ?

A

only allows application to run where that data and its functions are allowed to run. This prevent privilege escalation

47
Q

What is a cross site script ?

A

Information from one site is shared with another

48
Q

What is a non-persistent ( reflected) XSS attack?

A

It is an attack that allows the script to run in user input. For example, there is a fake website that allows session id to be available just from the user inserting information into the empty info box

49
Q

What is a persistent reflected (stored) attack?

A

An attack that is stored onto a post and does not specifically target a person, but all who come into contact with the post

50
Q

What is a code injection attack?

A

adding your own information into a data stream and stealing information, bad programming leads to this. This should not be allowed

51
Q

What is a buffer overflow?

A

One section of memory is an override a different section of memory

52
Q

What is a replay attack ?

A

An attacker gathers raw network data and send it across the network to make it seem as if it was coming someone in the network

53
Q

What is pass the hash ?

A

During this type of attack the attacker places a device between the victim and the server so that the attacker also receive the hash as it goes to the server to authenticate. why is this bad ?

54
Q

How can you protect a client from a pass the hash attack ?

A

End-to end encryption and salt ( one time authentication session id could not be used again)

55
Q

Explain what end to end encryption is

A

Both ends are encrypted. I send a friend a message using there public key and the decrypt it with there private key

56
Q

What is session Hijacking ( or sidejacking ) ?

A

An attacker gain the session id and bypasses the authentication and posses as you

57
Q

Explain what a cross site request forgery

A

An attacker will create a hyperlink that is sent to the victim to click. Once this has been clicked the victims computer will connect to the banks server and the attacker will naw be able to do whatever they want with the victims account

58
Q

Explain what a server side request forgery

A

An attacker finds a vulnerability within an application on the web server .The attacker will then send a request that will request the web server to gather more information the the victims server

59
Q

What are some attacks that can be done with drives ?

A

Since drivers work along side software , they can be manipulated to turn into a key logger to steal sensitive information as the person types it

60
Q

what is the windows shim? and how do attackers use it to get malware onto victims computer ?

A

The windows shims allows application to run on older window models. Attackers will write there own shim and this will help them by pass any user security features

61
Q

What is a metamorphic malware ? ( refactoring)

A

a metamorphic malware is an attack that appears different each due to it redesigning itself. This makes it extremely hard for anti-malware protection to protect.

62
Q

What is SSL stripping /HTTP downgrade ?

A

During this type of attack the attacker sit in between the client and the server and uses no encrypted communication between the victim and there self. The attacker will use encrypted communication( https) with the web server but communicate back to the victim in http to prompt the victim to keep sharing sensitive information. This can all be avoided by only using Https.

63
Q

What is a race condition ?

A

A race condition is behavior of a software system depends on the relative timing of events such as the order in which threads are scheduled to run.

64
Q

What is NULL Pointer dereference ?

A

a program will attempt to reference a portion of memory that does not have anything or is undefined. This will cause the application to crash.

65
Q

What is integer overflow ?

A

An integer overflow is larger number are placed into smaller sized space. This causes overflow into other memory sections.

66
Q

Explain what a directory traversal is

A

during this type of attack the hacker is able to read files of a web server that are outside of the websites file directory

67
Q

explain what improper error handling is

A

this is when error messages show to much information and could lead to sharing very sensitive information to the wrong personal

68
Q

Explain what a API attack is

A

An attack that looks into vulnerabilities in api-based apps

69
Q

What is a shim ? In operating system ?

A

In windows through the use of shims, an older software can be ran through a previous windows Version while still in the new version

70
Q

What is a rouge access point ? and its evil town ?

A

A rouge access point in a unauthorized access point that isn’t necessarily malicious . An wireless evil twin looks legitimate but it is malicious. If you are using the evil twin just make sure the communication in encrypted

71
Q

What is bluejacking ?

A

An unsolicited message via Bluetooth

72
Q

What is Bluesnarfing ?

A

An attacker can access data from your phone using Bluetooth

73
Q

What’s are management frames ?

A

Are a specific type of frame that is used in wireless networking. This protocol allows you to join/ leave the wireless network while also authenticating your device.

74
Q

What is an Disassociation attack ?

A

Is an attack the causes DOS by attacking the 802.11 protocol that is used to during wireless networking. This is because the management frames are not encrypted .

75
Q

What is RF jamming ?

A

During a RF jamming the good signal is no longer becoming the main signal because of the noise around.

76
Q
A
77
Q

What is a cryptographic nonce ?

A

This is a random or pseudo number that can’t be reasonably guessed. The nonce is added into the login process to help create different hashes each time to avoid a replay attack( aka decrypting the hash).

78
Q

What does it mean to salt a password ?

A

Salting means that a nonce is added to every pass word saved onto the data base. This means no hash will be the same even if the passwords are the same

79
Q

How do you add randomization to cryptography ?

A

By adding a nonce. A nonce is a set of value that is used for the time being. A nonce will be different every log in. The server will check your nonce along with your password hash and if it looks good will grant you acesss.

80
Q
A