Deck C Prt. 1 Flashcards

1
Q

ARP Spoofing Attack

A

To Identify an ARP Spoofing Attack in Absence of a VPN, you need to check your ARP Table and see if there is one IP Address with two different MAC Addresses. An Address that has been duplicated will show up as sending Traffic from Two Different Sources Simultaneously

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Black Box Pen Test

A

During Test you Attempt to Pass IRC Traffic over port 80 TCP From a compromised web Enabled host. the Traffic gets blocked; however outbound Application Firewall is used for Inspecting outbound Traffic when the HTTP traffic is flowing Unimpeded.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Censys

A

Is a public Search engine and Data Processing Company. Censys can Detect Specific Vulnerable Devices and networks. It then Creates Statistical Reports on broad usage patterns and trends. Censys can be used as an Information Gathering Tool to Collect Information About the IoT devices connected to a Network, Open p orts and Services
, and the attack surface area. Using this Tool, you can generate statistical Reports on Broad Usage Patterns and Trends.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

CA (Certificate Authority)

A

Is the Service in PKI that will Vouch for the Identity of an Individual or Company

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Credentialed Vulnerability Assessment

A

Is a Detailed Assessment that FINDS the Details of vulnerabilities and compromises through user Directories, Registries, and other system parameters’, Native configuration tables, incorrect Registry or File permissions, and software Configuration errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cross Site Request Forgery (XSRF)

A

Is a Web Browser Vulnerability in which the Hacker Conducts the Transaction from the User Account without his consent. This happens when the user Inadvertently Clicks on a Malicious link.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Cross Site Scripting (XSS)

A

Is the web Application Attack where the Attackers Exploit Vulnerabilities in Dynamically Generated Web Pages to Inject Client-Side Script into Web Pages Viewed by other Users. The Hackers Steal the cookies from the victims Machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DNS Cache Snooping

A

DHCP Cache Snooping is an Enumeration Technique in which the hacker queries the DNS Server for a Specific Cached DNS Record and Determines the Sites Recently Visited by the Organization’s User. DNS Cache snopping is when someone queries a DNS Server in order to find out (snoop) if the DNS server has a Specific DNS Record Cached, and thereby deduce if the DNS Server Owner (or Its Users) have recently visited a specific site.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DNS Hijacking

A

Is a Type of Cyber Attack in which DNS Queries are manipulated in order to redirect users to Malicious Sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DNS Cache Snooping

A

Is A Process of Determining if the Specified Resources Address is Present in the DNS Cache Records. It may be useful during the examination of the Network to Determine what software update Resources are used, thus Discovering what software is Installed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

DNSSEC

A

Can be Used to Mitigate DNS Cache Poisoning. DNSSEC also lowers the threat to you Domain name Server from DNS Cache Poisoning Attacks. Adjusting the TTL of you DNS Caching servers will certainly help with any DNS Cache poisoning issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Dark Web Footprinting

A

Uses a set of Specialized Tools or Search Engines to Encrypt Hackers Browsing Activity and Navigate Anonymously to obtain sensitive/Hidden Information about Official Government or Federal Databases. The Anonymity of the Dark Web Makes it an Attractive Technology for Illegal Purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Evil Twin

A

Is a Fraudulent Wi-Fi Access point that appears to be Legitimate but is set up to Eavesdrop on Wireless Communications. The Evil Twin is the Wireless LAN Equivalent of the Phishing Scam. In Evil Twin the Attacker Utilizes a Wi-Fi Pineapple to run an access point with a Legitimate Looking SSID for a nearby Business to Capture the Wireless Password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Five Tier Container Technology Architecture

A

Consists of 5 TIERS. Tier 1: Developer Machines-Image creation, testing and Accreditation, Tier 2: Testing and Accreditation systems-verification and validation of image contents, signing images and sending them to the registries. Tier 3: Registries- Storing images and disseminating Images to the orchestrators based on requests. Tier 4: Orchestrators- Transforming images into Containers and deploying Container to Hosts. Tier 5: Hosts- Operating and Managing Containers as Instructed by the orchestrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Gray Hat

A

is a Class of Hacker that Refers to an Individual who works BOTH Offensively and Defensively at Various Times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Guardster

A

Is an Anonymizer That mask you Real IP Address and Ensures complete and Continuous Anonymity for all online Activities.

17
Q

Honeypot

A

Creates an Appealing Isolated Environment for Hackers to prevent them from compromising Critical Systems While simultaneously gathering Information about the Hacker.

18
Q

Hping

A

Is a Tool that could be Used to get a Response from a Host Using TCP, If a Tester is Attempting to Ping a Target that exists but receives no Response or a Response that States the Destination is Unreachable.

19
Q

Inference Based Assessment

A

Is the Approach to an Assessment Which Depends on the Inventory of Protocols in an Environment to detect which ports are attached to services such as an Email Server, a Web Server, or a Database server

20
Q

Initial Intrusion

A

Is the Phase of APT Lifecycle in which the Hacker Attempts to enter the Target Network using Techniques such as Sending Spear Phishing Emails & Exploiting Vulnerabilities on Publicly available Servers and then Deploying Malware on the Target system to establish Outbound Connections.

21
Q

Invasion Of Privacy

A

From a Legal Standpoint, Not informing the Employees That they are Going to be monitored could be an Invasion of Privacy.

22
Q

Jamming & Scrambling Attacks

A

The Best Countermeasure Against the Jamming Attacks is to Implement Cognitive Radios in the Physical Layer. A Scrambling Attack is a Form of Intentional Physical Jamming Attack. A Scrambling Attack Attempts to DISRUPT Specific Intervals, such as a Control Channel.

23
Q

John The Ripper

A

Is a Technical Assessment Tool Used to Test the Weakness of Passwords

24
Q

LDAP

A

Is Lightweight Directory Access Protocol. LDAP (Port TCP 389) is not Secure or Encrypted and you must chat it to 636 which is LDAPS or SLDAP (Uses SSL or TLS)

25
Q

LNMIB2.MIB

A

Contains Object Types for Workstation and Server Services. MIB Stands for Management Information Base. It is a Database used by SNMP.