Explain Attacks, Threats, and Vulnerabilities Flashcards

Lesson 16A

1
Q
A

Relationship between vulnerability, threat, and risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
A

Example of a phishing email. On the right, you can see the message in its true form as the mail client has stripped out the formatting (shown on the left) designed to disguise the nature of the links. (Screenshot courtesy of CompTIA.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A

Using a command & control (C&C) network to operate a botnet of compromised hosts and
coordinate a DDoS attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
A

If authentication credentials are transmitted in cleartext, such as the unencrypted version of the
IMAP mailbox access protocol, it is a simple matter for the credentials to be intercepted via packet
sniffing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
A

Hashcat password cracking utility. This example uses a mask to speed up a brute force attack. The attacker can use a mask by learning or guessing likely facts about how the target chooses a password, such as its length and likelihood of being a variation on a simple word or phrase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly