LP - Threat Actors & Vectors Flashcards

1
Q

MaaS stands for

A

Malware as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

APT stands for

A

Advanced persistent threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the phishing variant whaling?

A

It is a spear phishing attack against high-level and highly privileged employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the phishing variant smishing?

A

It uses various text messing formats to communicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the phishing variant vishing?

A

It uses VoIP or phone as the hoax vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

XSS Variant DOM (document object model) -based is also called

A

local XSS or type 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

XSS DOM-base involve insecurely written

A

HTML pages or the end users system or local gadets and widgets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are Shellcode?

A

A small stub of code used as a payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DLL stands for

A

Dynamic link library

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a DLL?

A

a shared library of functions that multiple programs can access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a process?

A

It is an instance of a program being executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a thread?

A

It is a small sequence of instructions or a component of a process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does a VirtualAllocEx do?

A

It reserves or changes a region of memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Shellcode injects malicious code into a running

A

application of powershell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is process hollowing?

A

It starts a legitimate process whose sole purpose is to be a container for malicious code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Reflective DLL injection?

A

contents of a rogue DLL are injected into memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Reflected XSS is also called

A

Non-persistent or type 1

18
Q

Reflected XSS is a input

A

trust vulnerability, it is when the the attacker sends something the developer did not expect

19
Q

Stored XSS is also called

A

Persistent or Type 2

20
Q

In stores XSS the web server persists with the

21
Q

CSRF/XSRF stands for

A

Cross-site request forgery

22
Q

CSRF attacks force an end user to

A

perform undesirable actions in a web application in which they are authenticated

23
Q

RCE stands for

A

remote code execution

24
Q

RCE allows for some firmware to be

A

remotely reprogrammed

25
Q

RCE (remote code execution) is also called

A

field programmable gate arrays

26
Q

Hypervisors manage the

A

recources and interaction between the VM’s and the hardware

27
Q

Type I (bare metal) hypervisors

A

run directly on the underlying hardware

28
Q

Type II (hosted) runs on the

A

Installed OS

29
Q

VM sprawl is have

A

no centralised control of the hypervisors and virtual machines

30
Q

VM hopping is when administrators do not enforce the

A

partitioning of guests

31
Q

VM escape is

A

when guest access the underlying hypervisior or hardware

32
Q

Hyperjacking is when a privileged insider installs

33
Q

CSA stands for the

A

Cloud Security alliance

34
Q

CSA Trecherous 12

A
  1. Data breaches
  2. Weak identity, credential and access management
  3. Insecure APIs
  4. System and application vulnerabilities
  5. Account hijacking
  6. Malicious insiders
  7. Advanced persistent threats (APTs)
  8. Data Loss
  9. Insufficient due diligence
  10. Abuse and nefarious use of cloud services
  11. Denial of service
  12. Shared technology vulnerabilities
35
Q

Mobile Device vulnerabilities what is - side loading

A

install an app not from the official app store

36
Q

Mobile Device vulnerabilities what is - Jailbreaking

A

mainly iPhone, is the act of exploiting a flaw of a locked-down device

37
Q

EMM stands for

A

Enterprise Mobility Management

38
Q

MDM stands for

A

Mobile device management

39
Q

MAM stands for

A

Mobile application management

40
Q

BEC stands for

A

business email compromise