CPE 046 last quiz Flashcards

1
Q

is the term used for a broad range of malicious activities accomplished through human interactions. It uses psychological manipulation to trick users into making security mistakes or giving away sensitive information.

A

Social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

False promises to exasperate a victim’s greed or curiosity, luring them into traps to collect personal data or infect systems. Common methods include physical media (e.g., malware-infected USB drives) or malicious online ads.

A

Baiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bombards victims with false alarms or fictitious threats, tricking them into installing harmful software. Examples include deceptive popups or spam emails offering fake security services.

A

Scareware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Attackers craft believable lies to gain sensitive information by building false trust. Unlike phishing, pretexting exploits trust rather than fear/urgency.

A

Pretexting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Email/text campaigns creating urgency, curiosity, or fear to trick victims into revealing data, clicking malicious links, or opening malware-infected attachments. Example: Fake password-reset emails.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Targeted phishing using personalized messages based on victims’ characteristics (e.g., job roles). Requires significant effort but has higher success rates.

A

Spear Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Promises a reward (e.g., technical support) in exchange for information. Example: Fake IT experts requesting login credentials.

A

Quid Pro Quo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Exploits romantic/sexual interests online, luring victims to pay fees for communication, which are stolen.

A

Honey Traps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Good and Lawful, defensive, employed.

A

White Hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

they’re not malicious, but they’re not always ethical either.

A

Gray Hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a hacking newbie who may not know all there is to know,
causing him or her to make mistakes along the way.

A

Green Hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

unethical criminals who violate network security for
personal gain.

A

Black Hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

similar to white hat hackers, but white hat hackers are
usually part of the company, whereas blue hat hackers are outsourced.

A

Blue Hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a hacker who takes aggressive steps to stop black hat hackers. While red hat hackers are not inherently evil, they do everything they can to stop the bad guys, including taking matters into their own hands. Offensive white hat. Robin Hoods of the virtual world

A

Red Hat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

These criminals embody organizations of cyber criminals, hacktivists, terrorists, and state-sponsored hackers.

A

Organized Hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

These cyber crime organizations are groups of hackers, programmers and other tech bandits who combine their skills
and resources to commit major crimes that might not otherwise
be possible.

A

Organized Hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

driven by a particular political or social agenda.
“__________” tend to be more interested in embarrassing
companies or publicizing damning evidence of some sort and are usually

A

Hacktivists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

the unlawful use of violence and intimidation, especially against civilians, in the pursuit of political aims. Terrorist cyber crime tends to involve mostly the publication of propaganda, psychological campaigns (such as beheading
videos), intelligence, information sharing and other
communication.

A

Terrorists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

are carried out by cyber criminals
directly linked to a nation-state to exploit infrastructure vulnerabilities.

A

State-backed hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

are people who maliciously monitor the web activity of their victims to acquire personal data. This type of cyber crime is conducted through the use of social networking platforms and malware, that are able to track an individual’s PC activity with little or no detection.

A

Internet stalkers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Disgruntled employees become
hackers with a particular motive and also commit cyber crimes.
It is hard to believe that dissatisfied employees can become such malicious hackers.

A

Disgruntled Employees

21
Q

employees or contractors hired to be Attackers, ethical hackers that work for an organization finding security holes that a malicious individual could exploit.

A

The Red Team

22
Q

is important because they inform or report the vulnerability to the organization before any malicious attacker could exploit it.

A

Red teaming

23
Q

is an important factor in red teaming. It is a simulation-based attack that intends to get access of specific information. So, after getting the goals they plan the whole scenario.

24
Q

the organization’s Defenders, who are responsible for protective measures within an organization.

A

The Blue Team

25
Q

is to analyze and monitor the data. So, if the blue team saw any unusual activities, they can take preventive measure to protect the organization.

A

Blue team’s

25
Q

SOC

A

(Security Operation Centre)

26
Q

SIEM

A

(Security Information and Event Management)

27
Q

a kind of information gathering on network system and services. This enables the attacker to discover vulnerabilities or weaknesses on the network. It
could be likened to a thief surveying through a car parking
lot for vulnerable – unlocked - cars to break into and steal.
The 1st step in conducting network attacks.

A

Reconnaissance

28
Q

Reconnaissance attacks can consist of:

A

Internet information lookup,
Ping sweeps,
Port scans,
Packet sniffers.

29
Q
  • also known as ICMP(Internet Control Message Protocol ) sweep or a ping scan, is a network scanning technique you can use to find out which IP addresses map to live hosts.
A

Ping sweeps

30
Q

a common technique used to discover open doors or weak
points in a network. Port is a number assigned to uniquely identify a connection endpoint and to direct data to a specific service.

A

Port Scans

31
Q

technique whereby packet data flowing across the network
is detected and observed. Network administrators use packet sniffing tools to monitor and validate network traffic, while hackers may use similar tools for nefarious purposes.

A

Packet Sniffing

32
Q

exploit known vulnerabilities in authentication services, FTP services, and web services to gain entry to web accounts, confidential databases, and other sensitive information. An access attack allows an individual to gain unauthorized access to information that they have no right to view.

Types:
* Password Attack
* Trust Exploitation
* Port Redirection
* Man-in-the Middle Attack

A

Access attacks

33
Q

A Network attacker uses packet sniffer tools to obtain user accounts and passwords information. An attacker also repeatedly attempts to log in to a shared resource or to gain unauthorized access to an
organization’s network; this can also be referred to as dictionary or brute force attacks.

A

Password Attacks

34
Q

is a method of breaking into a password-protected computer, network or other IT resource by systematically entering every word in a dictionary as a password.

A

dictionary attack

35
Q

can also be used in an attempt to find the key necessary to decrypt an encrypted message or document.

A

dictionary attack

36
Q

is a popular password-cracking tool. John supports many encryption technologies for Windows and Unix systems (Mac
included).

A

John the Ripper (JtR)

37
Q

Social Engineering Attack Lifecycl

A

Investigation
- Preparing the ground for the attack:
Hook
- Deceiving the victim(s) to gain a foothold
Play
- Obtaining the information over a period of time:
Exit
- Closing the interaction, ideally without arousing suspicion:

38
Q

A brute-force attack is an attempt to discover a password by systematically trying every possible combination of
letters, numbers, and symbols until you discover the one correct
combination that works. This is a password-guessing attack.

A

Brute Force Attack

39
Q

is to compromise a trusted
host, using it to stage attacks on other hosts in a network.

A

Trust Exploitation

40
Q

If a host in a network of a company is protected by a firewall (inside
host), but is accessible to a trusted host outside the firewall (outside
host), the inside host can be attacked through the trusted outside
host.

A

Trust Exploitation

41
Q

is a type of eavesdropping attack, where attackers interrupt an
existing conversation or data transfer. After inserting themselves in
the “middle” of the transfer, the attackers pretend to be both
legitimate participants.

A

Man-in-the-Middle (MitM) Attack

42
Q

prevents authorized users from using services by consuming system
resources.

A

Denial of Service (DoS) Attacks

43
Q

is to oversaturate the capacity of a targeted machine, resulting in denial-of-service to additional
requests.

A

Denial of Service (DoS) Attacks

44
Q

DoS attacks typically fall in 2 categories:

A

Buffer overflow attacks
Flood attacks

45
Q

An attack type in which a memory buffer overflow can cause a machine to consume all available hard disk space, memory, or CPU time. This form of exploit often results in sluggish behavior, system crashes, or other deleterious server behaviors, resulting in denial-of-service.

A

Buffer overflow attacks

46
Q

By saturating a targeted server with an overwhelming amount of packets, a malicious actor is able to oversaturate server capacity, resulting in denial-of-service.

A

Flood attacks

47
Q

is a malicious attempt to
disrupt the normal traffic of a targeted server, service or network by overwhelming the target or its surrounding infrastructure with a flood of Internet traffic.

A

DDoS Attack

48
Q

________ is a network of computers infected
by malware that are under the control of a single attacking party, known as the “_________.” Each individual machine under the control of the bot- herder is known as a ______.

A

botnet (robot network)
“bot-herder.”
bot

49
Q

is a logical partition of a Layer 2 network.