Domain 1.0: Attacks, threats and vul. Flashcards

1
Q

Programming errors can result in system compromise, allowing someone to gain unauthorized privileges. This is known as ________

A

privilege escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

malware:

infect systems and spread copies of themselves

A

viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

malware:

similar to viruses but do not require a host to replicate

A

worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

malware:

disguise malicious code within apparently useful applications

A

trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

malware:

trigger on a particular condition

A

logic bombs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

malware:

can be installed and hidden on a computer mainly for the purpose of compromising the system

A

rootkits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

malware:

usually demands money in return for the release of data, which may have also been encrypted using crypto-malware

A

ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

malware:

may monitor browser activity and log keystrokes and may impact computer performance

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

______ and _______ often result in a computer running slowly and generating pop-ups.

A

spyware, adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

an ______ ______ seeks to make analysis difficult by including a metaphorical layer of armor around the virus

A

armored virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

__________ is a social engineering attack commonly done through email across a large audience

A

phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

____ _______ is a social engineering attack commonly done through email that targets an individual or an individual group

A

spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

_______ is similar to spear phishing but affects big targets, such as CEO

A

whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

in ____, also known as voice phishing, the attacker often uses a fake caller ID to appear as a trusted organization and attempt to get the individual to enter account details via the phone.

to obtain private information over the phone

A

vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

the term ________ is based on farming and phishing. It does not require the user to be tricked into clicking on a link. Instead, it redirects victims to a bogus website, even if they correctly entered the intended site

A

pharming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DoS and DDoS attacks involve disruption of normal network services and include attacks based on the ICMP (Internet control message protocol) echo reply called _______ _____

A

smurf attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

______ is the process of making data look as if it came from a trusted or legitimate orgin

A

spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

with an ___-___ ____, a third system intercepts traffic between two systems by pretending to be the other system.

A

on-path attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

_____ _____ involve reposting captured data

A

replay attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

____-___ vulnerabilities do not have patches yet and aren’t detected by antimalware software

A

zero-day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

_______ _______, ____-____, and ______ ____ involve repeated guessing of logons and passwords.

A

password guessing, brute-force and dictionary attacks

22
Q

____ __________ allows a perpetrator to redirect traffic by changing the IP record for a specific domain (thus permitting attackers to send legitimate traffic anywhere they choose).

A

DNS poisoning

23
Q

_____ _______ is a layer 2 attack that deceives a device on a network and poisons the table associations of other devices

A

ARP (address resolution protocol) poisoning

24
Q

____ is an attack in which the end user executes unwanted actions on a web application while currently authenticated

A

XSRF (cross site request forgery)

25
Q

____ vulnerabilities can be used to hijack a user’s session

A

XSS

26
Q

Injection attacks include ____, ____, ___, and _____. Such attacks insert code or malicious input to try to force unauthorized activity or access

A

SQL, LDAP (lightweight directory access protocol-open, vendor neutral, industry standard application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network), DLL (dynamic link library-file used to provide functionality to other programs) and XML (extensible markup language-markup language and file format for storing, transmitting, and reconstructing arbitrary data)

27
Q

a _____ ____ ____ is an unauthorized wireless access point that is set up

A

rogue access point

28
Q

a rogue access point can serve as a type of on-path attack that is often referred to as an ___ ____

A

evil twin

29
Q

in ______, attackers generate messages that appear to come from the device itself, leading users to follow obvious prompts and establish an open Bluetooth connection to the attacker’s device

A

bluejacking

30
Q

when a user pairs with an attacker’s device, the user’s data becomes available for unauthorized access, modification, or deletion. this is an aggressive attack referred to as _______

A

bluesnarfing

31
Q

when traffic being sent across a network is unencrypted, ______ ______ enables an attacker to capture the data and decode it from its raw form into readable text

A

packet sniffing

32
Q

____ _____ _____ include the actor’s relationship to the organization, motive, intent, and capability.

A

threat actor attributes

33
Q

_________ _____ types include script kiddies, insiders, hacktivists, organized crime, competitors, and nation-states

A

threat actor

34
Q

_____-____ and ______ ___ are likely to have greater capabilities than other threat actors. competitors are more likely to want to steal intellectual property to gain a competitive advantage

A

nation-states, organized crime

35
Q

______ describes information for collection from publicly available information sources, such as publications, geospatial information, and many online resources

A

OSINT (open source intelligence)

36
Q

in a ___-___ test, the assessor has no information or knowledge about the inner workings of the system

A

black-box

37
Q

the 4 primary phases of a pen test are _____, ___, ___, and ____.

A

planning, discovery, attack, and reporting

38
Q

____-____ techniques are often tests to see whether programming constructs are placed correctly and to carry out the required actions. the assessor has knowledge about the inner workings of the system or knowledge of the source code

A

white-box

39
Q

___-___ testing uses a combination of both white and black-box techniques. the tester has some understanding of or limited knowledge of the inner workings

A

gray-box

40
Q

____ _____, _____ of ____, ____ and _______ occur (in this order) during the attack phase of a penetration test

A

initial exploitation, escalation of privilege, pivot and persistence

41
Q

a ______ ____ identifies vulnerabilities, misconfigurations and lacking security controls

A

vulnerability scan

42
Q

a _____ ____ ____ helps reduce false positives

A

credentialed vulnerability scan

43
Q

a ____ ____ can result in system malfunction and unexpected results. resulting errors can cause crashes and may allow attackers to escalate their privileges.

A

race condition

44
Q

_____ accounts and passwords provide a simple means for an attacker to gain access

A

default

45
Q

proper ____ _____, prevents input that can impact data flow, allowing an attacker to gain control of a system or remotely execute commands

A

input handling

46
Q

turning off an ____ ______ hides the network from appearing but does not effectively protect a wireless entwork from attack

A

SSID broadcast

47
Q

a ___ _____ occurs when a typical or expected behavior is identified as being irregular or malicious

A

false positive

48
Q

a ___ ____ occurs when an alert that should have been generated did not occur

A

false negative

49
Q

_____ tools collect, correlate, and display data feeds that support response activities

A

SIEM

50
Q

_____ combines security orchestration and automation with threat intelligence platforms and incident response platforms

A

SOAR

51
Q

____ ______ is a proactive approach to finding an attacker before alerts are triggered

A

threat hunting