Domain 1.0: Attacks, threats and vul. Flashcards

1
Q

Programming errors can result in system compromise, allowing someone to gain unauthorized privileges. This is known as ________

A

privilege escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

malware:

infect systems and spread copies of themselves

A

viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

malware:

similar to viruses but do not require a host to replicate

A

worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

malware:

disguise malicious code within apparently useful applications

A

trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

malware:

trigger on a particular condition

A

logic bombs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

malware:

can be installed and hidden on a computer mainly for the purpose of compromising the system

A

rootkits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

malware:

usually demands money in return for the release of data, which may have also been encrypted using crypto-malware

A

ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

malware:

may monitor browser activity and log keystrokes and may impact computer performance

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

______ and _______ often result in a computer running slowly and generating pop-ups.

A

spyware, adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

an ______ ______ seeks to make analysis difficult by including a metaphorical layer of armor around the virus

A

armored virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

__________ is a social engineering attack commonly done through email across a large audience

A

phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

____ _______ is a social engineering attack commonly done through email that targets an individual or an individual group

A

spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

_______ is similar to spear phishing but affects big targets, such as CEO

A

whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

in ____, also known as voice phishing, the attacker often uses a fake caller ID to appear as a trusted organization and attempt to get the individual to enter account details via the phone.

to obtain private information over the phone

A

vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

the term ________ is based on farming and phishing. It does not require the user to be tricked into clicking on a link. Instead, it redirects victims to a bogus website, even if they correctly entered the intended site

A

pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DoS and DDoS attacks involve disruption of normal network services and include attacks based on the ICMP (Internet control message protocol) echo reply called _______ _____

A

smurf attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

______ is the process of making data look as if it came from a trusted or legitimate orgin

A

spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

with an ___-___ ____, a third system intercepts traffic between two systems by pretending to be the other system.

A

on-path attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

_____ _____ involve reposting captured data

A

replay attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

____-___ vulnerabilities do not have patches yet and aren’t detected by antimalware software

A

zero-day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

_______ _______, ____-____, and ______ ____ involve repeated guessing of logons and passwords.

A

password guessing, brute-force and dictionary attacks

22
Q

____ __________ allows a perpetrator to redirect traffic by changing the IP record for a specific domain (thus permitting attackers to send legitimate traffic anywhere they choose).

A

DNS poisoning

23
Q

_____ _______ is a layer 2 attack that deceives a device on a network and poisons the table associations of other devices

A

ARP (address resolution protocol) poisoning

24
Q

____ is an attack in which the end user executes unwanted actions on a web application while currently authenticated

A

XSRF (cross site request forgery)

25
____ vulnerabilities can be used to hijack a user's session
XSS
26
Injection attacks include ____, ____, ___, and _____. Such attacks insert code or malicious input to try to force unauthorized activity or access
SQL, LDAP (lightweight directory access protocol-open, vendor neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network), DLL (dynamic link library-file used to provide functionality to other programs) and XML (extensible markup language-markup language and file format for storing, transmitting, and reconstructing arbitrary data)
27
a _____ ____ ____ is an unauthorized wireless access point that is set up
rogue access point
28
a rogue access point can serve as a type of on-path attack that is often referred to as an ___ ____
evil twin
29
in ______, attackers generate messages that appear to come from the device itself, leading users to follow obvious prompts and establish an open Bluetooth connection to the attacker's device
bluejacking
30
when a user pairs with an attacker's device, the user's data becomes available for unauthorized access, modification, or deletion. this is an aggressive attack referred to as _______
bluesnarfing
31
when traffic being sent across a network is unencrypted, ______ ______ enables an attacker to capture the data and decode it from its raw form into readable text
packet sniffing
32
____ _____ _____ include the actor's relationship to the organization, motive, intent, and capability.
threat actor attributes
33
_________ _____ types include script kiddies, insiders, hacktivists, organized crime, competitors, and nation-states
threat actor
34
_____-____ and ______ ___ are likely to have greater capabilities than other threat actors. competitors are more likely to want to steal intellectual property to gain a competitive advantage
nation-states, organized crime
35
______ describes information for collection from publicly available information sources, such as publications, geospatial information, and many online resources
OSINT (open source intelligence)
36
in a ___-___ test, the assessor has no information or knowledge about the inner workings of the system
black-box
37
the 4 primary phases of a pen test are _____, ___, ___, and ____.
planning, discovery, attack, and reporting
38
____-____ techniques are often tests to see whether programming constructs are placed correctly and to carry out the required actions. the assessor has knowledge about the inner workings of the system or knowledge of the source code
white-box
39
___-___ testing uses a combination of both white and black-box techniques. the tester has some understanding of or limited knowledge of the inner workings
gray-box
40
____ _____, _____ of ____, ____ and _______ occur (in this order) during the attack phase of a penetration test
initial exploitation, escalation of privilege, pivot and persistence
41
a ______ ____ identifies vulnerabilities, misconfigurations and lacking security controls
vulnerability scan
42
a _____ ____ ____ helps reduce false positives
credentialed vulnerability scan
43
a ____ ____ can result in system malfunction and unexpected results. resulting errors can cause crashes and may allow attackers to escalate their privileges.
race condition
44
_____ accounts and passwords provide a simple means for an attacker to gain access
default
45
proper ____ _____, prevents input that can impact data flow, allowing an attacker to gain control of a system or remotely execute commands
input handling
46
turning off an ____ ______ hides the network from appearing but does not effectively protect a wireless entwork from attack
SSID broadcast
47
a ___ _____ occurs when a typical or expected behavior is identified as being irregular or malicious
false positive
48
a ___ ____ occurs when an alert that should have been generated did not occur
false negative
49
_____ tools collect, correlate, and display data feeds that support response activities
SIEM
50
_____ combines security orchestration and automation with threat intelligence platforms and incident response platforms
SOAR
51
____ ______ is a proactive approach to finding an attacker before alerts are triggered
threat hunting