Domain 3: System Vulnerabilities Flashcards

1
Q

Method that is used to pass info over a path that is not normally used for communication

A

Covert Channels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Shortcut in a system that allows a user to bypass security checks, such as username/password

A

Backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Backdoor installed by developers to bypass normal system checks during development such as authentication

A

Maintenance hooks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • Virus written macro language

- i.e. Microsoft Office

A

Macro Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Virus that infects the boot sector of a PC, which ensures that the virus loads upon system startup

A

Boot Sector Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Virus that changes itself from the OS and other protective software i.e. antivirus software

A

Stealth Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Virus that changes its signature upon infection of a new system, attempting to evade signature based antivirus software

A

Polymorphic Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Virus that spreads via multiple vectors

A

Multipartite Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Malware that self-propagates

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Malware disguised as a legitimate program

A

Trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Malware that replaces portions of the kernel and/or OS

A

Rootkits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • Neutral technology used to shrink the size of executables

- Often used in malware to evade signature-based malware detection

A

Packers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • Malware that is triggered when a logical condition is met

- i.e. after a set number of transactions, or on a specific data

A

Logic bombs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Antivirus that uses static signatures of known malware

A

Signature-based antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Anomaly-based detection used to identify behavioral characteristics of malware

A

Heuristic-based antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Attacks launched directly from an attacker (the client) to a listening service

A

Server-side attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Attack that initiates from the victim who downloads content from the attacker

A

Client-side attacks

18
Q
  • Small pieces of mobile code that are embedded on other software such as web browsers
  • Programming languages Java and ActiveX
A

Applets

19
Q

Applets that are in a sandbox which segregates the code from the OS

A

Java

20
Q
  • Applets that use digital certificates to provide security

- Only works on Windows OS

A

ActiveX

21
Q

Provides consensus guidance on what are considered to be the 10 most significant application security risks

A

Open Web Application Security Project (OWASP) Top 10 Project

22
Q

Language used to store application configuration and output from auditing tools

A

Extensible Markup Language (XML)

23
Q
  • Reduces application architecture down to a functional unit of service
  • Service can be used and reused throughout an organization rather than built within each individual application
A

Service-Orientated Architecture (SOA)

24
Q
  • Allows two different objects to have the same name

- i.e. Two rows may have the same primary key, but different data

A

Polyinstantiation

25
Q
  • Happens when a user is able to use lower-level access to learn restricted information
  • Requires clues (first word)
  • Mathematical process (second word)
A

Inference and aggregation

26
Q

Searches large amounts of data to determine patterns

A

Data Mining

27
Q

Control that restricts the use of mobile devices via policy

A

Administrative controls

28
Q

Controls installed on mobile devices to mitigate infections

A

Technical controls

29
Q
  • Access control vulnerability that involves theft of data by capturing electromagnetic leaks
  • Mitigated by enclosing cable in metal shielding or conduit certain types of antennas are resistant also
A

Emanations

30
Q

Program between the US and UK that mitigates electromagnetic leaks

A

TEMPEST

31
Q
  • Denial of Service (DoS) attack
  • Attacker sends ICMP echo request packets with a spoofed source address.
  • Every device that receives a ping request will send an ICMP echo reply to the spoofed source address, which can overwhelm the device at the source address
A

Smurf

32
Q
  • Denial of Service (DoS) attack
  • Attacker sends UDP packets with a spoofed address to a directed broadcast address.
  • Each device that receives an UDP broadcasts will send a response to the spoofed address, which can overwhelm the device at the source address
A

Fraggle

33
Q
  • Denial of Service (DoS) attack
  • Attacker uses a malformed IP packet where the source, destination address, and the port are the same.
  • When victim at the destination address receives the packet, it can become confused and crash
A

Local Area Network Denial (LAND)

34
Q
  • Denial of Service (DoS) attack
  • Attacker uses several large overlapping IP fragments
  • Victim system will attempt to assemble these packets, sometime causing system to crash
A

Teardrop

35
Q

Name the three TEMPEST countermeasures used to protect against emanation attacks?

A
  1. Faraday cage
  2. White noise
  3. Control Zones
36
Q
  • A room, box or entire building with an external metal skin
  • Prevents electromagnetic signals (emanations) from exiting or entering the area
  • Mobile phones, radio stations television stations do not work inside this area
A

Faraday cage

37
Q
  • Broadcasts false traffic at all times to mask and hide the presence of real emanations
  • Effective when used around the perimeter of an area, it is broadcast outward to protect the internal area where emanations may be needed for normal operations
A

White noise

38
Q

Implementation of either a Faraday cage or white noise generation or both to protect a specific area in an environment

A

Control Zones

39
Q

Sends oversized ping packets to the victim, causing the victim to freeze, crash, or reboot

A

Ping-of-death attacks

40
Q

Use a command and control server to remotely control the zombies to launch attacks on other systems, or to send spam or phishing emails

A

Bot herders