Day 11 - Network Security Concepts Flashcards

1
Q

Solve for the security term based on the description:

A weakness in a system or its design that could be exploited by a threat

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Solve for the security term based on the description:

Anything of value to the organization, including people, equipment, resources and data

A

Assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Solve for the security term based on the description:

A potential danger to a company’s assets, data or network functionality

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Solve for the security term based on the description:

A mechanism that takes advantage of a vulnerability

A

Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Solve for the security term based on the description:

The process of taking countermeasures to reduce the likelihood or severity of a potential threat or risk

A

Mitigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Solve for the security term based on the description:

The likelihood of a threat exploiting the vulnerability of an asset, with the aim of negatively affecting an organization

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An __________ vector is a path by which a threat actor can gain access to a server, host, or network

A

Attack (vector)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data loss or data __________ occurs when data is intentionally or unintentionally lost, stolen or leaked to the outside world

A

Exfiltration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Solve for the data loss vector term based on the description:

Intercepted email or IM messages could be captured and reveal confidential information

A

Email/Social networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Solve for the data loss vector term based on the description:

If data is not stored using encryption algorithm, the thief may be able to retrieve valuable confidential information

A

Unencrypted devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Solve for the data loss vector term based on the description:

Sensitive data can be lost if access to the cloud is compromised due to weak security settings

A

Cloud storage devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Solve for the data loss vector term based on the description:

An employee could perform an unauthorized transfer of data to a USB drive or a USB drive containing valuable data could be lost

A

Removable media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Solve for the data loss vector term based on the description:

Confidential data should be shredded when no longer required

A

Hard copy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Solve for the data loss vector term based on the description:

Passwords or weak passwords that have been compromised can provide a threat actor with easy access to corporate data

A

Improper access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Solve for the pen testing tool term based on the description:

These types of tools are often referred to as password recovery tools and can be used to crack or recover a password. These tools repeatedly make guesses in order to crack a password

A

Password crackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Solve for the pen testing tool term based on the description:

These types of tools are used to intentionally hack into a wireless network to detect security vulnerabilities

A

Wireless hacking tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Solve for the pen testing tool term based on the description:

These types of tools are used to probe network devices, servers and hosts for open TCP and UDP ports

A

Networking scanning and hacking tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Solve for the pen testing tool term based on the description:

These tools are used to probe and test a firewall’s robustness using specially forged packets

A

Packet crafting tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Solve for the pen testing tool term based on the description:

These tools are used to capture and analyze packets in traditional Ethernet LAN or WANs

A

Packet sniffers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Solve for the pen testing tool term based on the description:

This is a directory and file integrity checker used by white hats to detected installed rootkits

A

Rootkit detectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Solve for the pen testing tool term based on the description:

These tools are used by white hat hackers to sniff out any trace of evidence existing in a computer

A

Forensic tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Solve for the pen testing tool term based on the description:

These tools are used by black hats to reverse engineer binary files when writing exploits. They are also used by white hats when analyzing malware

A

Debuggers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Solve for the pen testing tool term based on the description:

These are specially design operating systems preloaded with tools optimized for hacking

A

Hacking operating systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Solve for the pen testing tool term based on the description:

These tools use algorithms schemes to encode data to prevent unauthorized access to the encrypted file

A

Encryption tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Solve for the pen testing tool term based on the description:

These tools identify whether a remote host is vulnerable to security attacks

A

Vulnerability exploitation tools

25
Q

Solve for the pen testing tool term based on the description:

These tools scan a network or system to identify open ports

A

Vulnerability scanners

26
Q

Solve for the attack type term based on the description:

A threat actor captures and listens to network traffic. This attack is also referred to as sniffing or snooping

A

Eavesdropping attack

27
Q

Solve for the attack type term based on the description:

If threat actors have captured enterprise traffic, they can alter the data in the packet without the knowledge of the sender or receiver

A

Data modification attack

28
Q

Solve for the attack type term based on the description:

A threat actor constructs an IP packet that appears to originate from a valid address inside the corporate intranet

A

IP address spoofing attack

29
Q

Solve for the attack type term based on the description:

A threat actor who discovers a valid user account has the same rights as a real user. A threat actor can use a valid account obtain lists of other users or network information, change server and network configurations and modify, reroute or delete data

A

Password-based attacks

30
Q

Solve for the attack type term based on the description:

This type of attack prevents normal use of a computer or network by valid users. It floods a computer or an entire network with traffic until a shutdown occurs because of the overload

A

Denial of service attack

31
Q

Solve for the attack type term based on the description:

This attack occurs when threat actors have positioned themselves between a source and destination and actively monitor, capture and control the communications transparently

A

Man in the middle attack

32
Q

Solve for the attack type term based on the description:

If a threat actor obtains a secret key, that key is referred to as this…

A

Compromised-key attack

33
Q

Solve for the attack type term based on the description:

This is an application or device that can read, monitor and capture network data exchanges and read network packets. If packets are not encrypted, this type of attack provides a full view of the data inside a packet

A

Sniffer attack

34
Q

Solve for the type of malware based on the definition:

Executes arbitrary code and installs copies of itself in the memory of the infected computer

A

Worm

35
Q

Solve for the type of malware based on the definition:

Malicious software that executes a specific, unwanted, often harmful function on a computer

A

Virus

36
Q

Solve for the type of malware based on the definition:

Non self replicating type of malware. If often contains malicious code that is designed to look like something else, such as a legitimate file or application

A

Trojan horse

37
Q

What are some other types of malware other than worms, viruses or trojan horses?

A

Adware
Ransomware
Rootkits
Spyware

38
Q

What are 5 types of common network attacks?

A

reconnaissance attacks
access attacks
DoS attacks
Social engineering attacks
Attacks on the TCP/IP suite

39
Q

Solve for the reconnaissance attack technique based on the description:

The threat actor looks for initial information about a target. Various tools can be used such as a google search, organization’s website and WHOIS

A

Information query of a target

40
Q

Solve for the reconnaissance attack technique based on the description:

An information query usually reveals the target’s network address. The threat actor can then initiate this to determine which IP addresses are active

A

Ping sweep

41
Q

Solve for the reconnaissance attack technique based on the description:

This can be used to determine which ports or services are available

A

Port scans

42
Q

Solve for the reconnaissance attack technique based on the description:

This can query the identified ports to determine the type and version of the application and OS running on the host

A

Vulnerability scanner

43
Q

Solve for the reconnaissance attack technique based on the description:

Threat actor attempts to discover vulnerable services that can be exploited. These tools include Metasploit, Core Impact, sqlmap, Social-engineering toolkit and Netsparker

A

Exploitation Tools

44
Q

Solve for the access attack based on the description:

The threat actor attempts to discover critical system passwords using various methods

A

Password attack

45
Q

Solve for the access attack based on the description:

The threat actor has a device pose as another device by falsifying data

A

Spoofing attack

46
Q

Solve for the access attack based on the description:

The threat actor uses unauthorized privileges to gain access to a system

A

Trust exploitation

47
Q

Solve for the access attack based on the description:

The threat actor uses a compromised system as a base for attacks against other targets

A

Port redirection

48
Q

Solve for the access attack based on the description:

The threat actor is positioned between two legitimate entities in order to read or modify data that passes between the two

A

Man in the middle attack

49
Q

Solve for the access attack based on the description:

The threat actor exploits the buffer memory and overwhelms it with unexpected values. This usually leads to a DoS attack

A

Buffer overflow attack

50
Q

Solve for the type of attack based on the definition below:

Threat actors attempt to manipulate individuals into performing actions or divulging confidential information

A

Social engineering attacks

51
Q

Solve for the social engineering attack based on the description:

An attack in which a threat actor creates a targeted phishing attack tailored for a specific individual or organization

A

Spear phishing attack

52
Q

Solve for the social engineering attack based on the description:

An attack in which a threat actor sends a fraudulent email that is disguised as being from a legitimate, trusted source

A

Phishing

53
Q

Solve for the social engineering attack based on the description:

Unsolicited email

A

Spam

54
Q

What kind of attack creates some sort of interruption of network services to users, devices or applications

A

DoS Attack

55
Q

DoS attacks are created in what two ways?

A

Overwhelming quantity of traffic
Maliciously formatted packets

56
Q

A threat actor may build a network of infected hosts called __________

A

Zombies

57
Q

A network of “zombies” is known a what?

A

Botnet

58
Q

What does uRPF stand for and what it is used to guard against?

A

Unicast Reverse Path Forwarding
Used to guard against spoofed IP Addresses

59
Q

What are the 4 transport layer attacks?

A

TCP Syn Flood Attack
TCP reset attack
TCP session hijacking
UDP flood attack

60
Q
A