Module 3 Flashcards

1
Q

What are the 3 CIA Triad

A

Confidentiality, Integrity, Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Anything of value to the organization. It includes people, equipment, resources, and data

A

Asset

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A weakness in a system, or its design, that could be exploited by a threat

A

vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A potential danger to a company’s assets, data, or network functionality

A

threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A mechanism that takes advantage of a vulnerability

A

exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Counter-measure that reduces the likelihood or severity of a potential threat or risk.

A

mitigation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The likelihood of a threat to exploit the vulnerability of an asset, with the aim of negatively affecting an organization

A

risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A path by which a threat actor can gain access to a server, host, or network.

A

attack vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

____ or data exfiltration is when data is intentionally or unintentionally lost, stolen, or leaked to the outside world

A

Data loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What should be done to confidential data no longer required by a company

A

shredded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Hackers are also called as ____

A

threat actors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Ethical hackers who use their programming skills for good, ethical, and legal purposes.

A

White Hat Hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

These are individuals who commit crimes and do arguably unethical things, but not for personal gain or to cause damage

A

Gray Hat Hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

These are unethical criminals who compromise computer and network security for personal gain, or for malicious reasons, such as attacking networks

A

Black Hat Hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

These are teenagers or inexperienced hackers running existing scripts, tools, and exploits, to cause harm, but typically not for profit.

A

Script Kiddies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

These are usually gray hat hackers who attempt to discover exploits and report them to vendors, sometimes for prizes or rewards

A

Vulnerability Broker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

These are gray hat hackers who publicly protest organizations or governments by posting articles, videos, leaking sensitive information, and performing network attacks.

A

Hacktivists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

These are black hat hackers who are either self-employed or working for large cybercrime organizations

A

Cyber criminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

These are either white hat or black hat hackers who steal government secrets, gather intelligence, and sabotage networks. Their targets are foreign governments, terrorist groups, and corporations

A

State-Sponsored

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Penetration Testing Tool which repeatedly make guesses in order to crack the password

A

Password Crackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Penetration Testing Tool used to intentionally hack into a wireless network to detect security vulnerabilities.

A

Wireless Hacking Tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Tools that are used to probe network devices, servers, and hosts for open TCP or UDP ports.

A

Network Scanning and Hacking Tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

These tools are used to probe and test a firewall’s robustness using specially crafted forged packets

A

Packet Crafting Tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

These tools are used to capture and analyze packets within traditional Ethernet LANs or WLANs

A

Packet Sniffers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Tools used by threat actors to discover a computer’s security vulnerabilities.

A

Fuzzers to Search Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

These tools are used by white hat hackers to sniff out any trace of evidence existing in a computer.

A

Forensic Tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

These tools are used by black hats to reverse engineer binary files when writing exploits.

A

Debuggers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

This is when a threat actor captures and “listens” to network traffic.

A

Eavesdropping Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

If threat actors have captured enterprise traffic, they can alter the data in the packet without the knowledge of the sender or receiver (type of threat actor attack)

A

Data Modification Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

This happens when a threat actor constructs an IP packet that appears to originate from a valid address inside the corporate intranet

A

IP Address Spoofing Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Type of attack where threat actors could use a valid account to obtain lists of other users, network information, change server and network configurations, and modify, reroute, or delete data.

A

Password-Based Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

A ___ attack prevents normal use of a computer or network by valid users. It can also flood a computer or the entire network with traffic until a shutdown occurs because of the overload.

A

Denial of Service Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

This attack occurs when threat actors have positioned themselves between a source and destination. They can now actively monitor, capture, and control the communication transparently

A

Man-in-the-Middle Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

If a threat actor obtains a secret key, that key is referred to as a compromised key. A compromised key can be used to gain access to a secured communication without the sender or receiver being aware of the attack

A

Compromised-Key Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

___ require human action to propagate and infect other computers.

A

viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

____ hides by attaching itself to computer code, software, or documents on the computer.

A

virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

This type of malware is a program that looks useful but also carries malicious code. They are often provided with free online programs such as computer games.

A

trojan horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Type of malware that can display unsolicited advertising using pop-up web browser windows, new toolbars, or unexpectedly redirect a webpage to a different website

A

adware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Type of malware that denies a user access to their files by encrypting the files and then displaying a message demanding a ransom for the decryption key.

A

ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Used by threat actors to gain administrator account-level access to a computer. They are very difficult to detect because they can alter firewall, antivirus protection, system files, and even OS commands to conceal their presence.

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Like adware but, used to gather information about the user and send to threat actors without the user’s consent.

A

spyware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What does CVE stand for?

A

Common Vulnerabilities and Exposures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

A self-replicating program that propagates automatically without user actions by exploiting vulnerabilities in legitimate software. The intent of is usually to slow or disrupt network operations

A

worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What does CWE stand for?

A

Common Weaknesses Enumeration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

List of known instances of vulnerabilities within a product or a
system

A

Common Vulnerabilities and Exposures (CVE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Dictionary of weaknesses that may lead to vulnerability

A

Common Weaknesses Enumeration (CWE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Threat actors use this attack to do unauthorized discovery and mapping of systems, services, or vulnerabilities. This attack precedes access attacks or DoS attack

A

Reconnaissance Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

This type of attack exploits known vulnerabilities in authentication services, FTP services, and web services. The purpose of is to gain entry to web accounts, confidential databases, and other sensitive information

A

access attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

In this attack, the threat actor attempts to discover critical system passwords using various methods

A

Password Attacks

50
Q

In this attack, the threat actor device attempts to pose as another device by falsifying data

A

spoofing attack

51
Q

_____ is an access attack that attempts to manipulate individuals into performing actions or divulging confidential information. Some techniques are performed in-person while others may use the telephone or internet

A

Social engineering

52
Q

A threat actor pretends to need personal or financial data to confirm the identity of the recipient.

A

Pretexting

53
Q

A threat actor sends fraudulent email which is disguised as being from a legitimate, trusted source to trick the recipient into installing malware on their device, or to share personal or financial information

A

Phishing

54
Q

A threat actor creates a targeted phishing attack tailored for a specific individual or organization.

A

Spear phishing

55
Q

Also known as junk mail, this is unsolicited email which often contains harmful links, malware, or deceptive content

A

Spam

56
Q

Sometimes called “Quid pro quo”, this is when a threat actor requests personal information from a party in exchange for something such as a gift

A

Something for Something

57
Q

A threat actor leaves a malware infected flash drive in a public location. A victim finds the drive and unsuspectingly inserts it into their laptop, unintentionally installing malware

A

Baiting

58
Q

This type of attack is where a threat actor pretends to be someone they are not to gain the trust of a victim.

A

Impersonation

59
Q

This is where a threat actor quickly follows an authorized person into a secure location to gain access to a secure area.

A

Tailgating

60
Q

This is where a threat actor inconspicuously looks over someone’s shoulder to steal their passwords or other information.

A

Shoulder surfing

61
Q

This is where a threat actor rummages through trash bins to discover confidential documents

A

Dumpster diving

62
Q

Similar to a DoS attack, but it originates from multiple, coordinated sources.

A

Distributed DoS Attack (DDoS)

63
Q

Two major types of DoS attacks

A

Overwhelming Quantity of Traffic and Maliciously Formatted Packets

64
Q

Threat actors use Internet Control Message Protocol (ICMP) echo packets (pings) to discover subnets and hosts on a protected network, to generate DoS flood attacks, and to alter host routing tables.

A

ICMP attacks

65
Q

Threat actors attempt to prevent legitimate users from accessing information or services using DoS and DDoS attacks.

A

Amplification and
reflection attacks

66
Q

Threat actors spoof the source IP address in an IP packet to perform blind spoofing or non-blind spoofing.

A

Address spoofing attacks

67
Q

Threat actors position themselves between a source and destination to transparently monitor, capture, and control the communication. They could eavesdrop by inspecting captured packets, or alter packets and forward them to their original destination.

A

Man-in-the-middle attack (MITM)

68
Q

Threat actors gain access to the physical network, and then use an MITM attack to hijack a session

A

Session hijacking

69
Q

This is used to perform host verification and DoS attacks. (ICMP Message)

A

ICMP echo request and echo reply

70
Q

This is used to perform network reconnaissance and scanning attacks (ICMP Message)

A

ICMP unreachable

71
Q

This is used to map an internal IP network. (ICMP Message)

A

ICMP mask reply

72
Q

This is used to lure a target host into sending all traffic through a compromised device and create a MITM attack (ICMP Message)

A

ICMP redirects

73
Q

This is used to inject bogus route entries into the routing table of a target host. (ICMP Message)

A

ICMP router discovery

74
Q

Address Spoofing Attack where the threat actor can see the traffic that is being sent between the host and the target.

A

Non-blind spoofing

75
Q

Address Spoofing Attack where the threat actor cannot see the traffic that is being sent between the host and the target; used in DoS attacks

A

Blind spoofing

76
Q

What does TCP stand for?

A

Transmission Control Protocol

77
Q

What does UDP stand for?

A

user datagram protocol

78
Q

3 TCP Services

A

Reliable delivery, flow control and stateful communication

79
Q

Protocol that defines an automated service that matches resource names, such as www.cisco.com, with the required numeric network address, such as the IPv4 or IPv6 address.

A

Domain Name Service (DNS)

80
Q

4 kinds of DNS attacks

A

*DNS open resolver attacks
*DNS stealth attacks
*DNS domain shadowing attacks
*DNS tunneling attacks

81
Q

Involves the threat actor gathering domain account credentials in order to silently create multiple sub-domains to be used during the attacks.

A

DNS Domain Shadowing Attacks

82
Q

Threat actors who use _______ place non-DNS traffic within DNS traffic

A

DNS tunneling

83
Q

Occurs when a rogue DHCP server is connected to the network and provides false IP configuration parameters to legitimate clients

A

DHCP spoofing attack

84
Q

Only authorized individuals, entities, or processes can access sensitive information. It may require using cryptographic encryption algorithms such as AES to encrypt and decrypt data. (CIA security triad)

A

Confidentiality

85
Q

Refers to protecting data from unauthorized alteration. It requires the use of cryptographic hashing algorithms such as SHA (CIA security triad)

A

Integrity

86
Q

Authorized users must have uninterrupted access to important resources and data. It requires implementing redundant services, gateways, and links. (CIA security triad)

A

Availability

87
Q

A system, or group of systems, that enforces an access control policy between networks

A

Firewalls

88
Q

What does ESA stand for?

A

Email Security Appliance

89
Q

What does SMTP stand for?

A

Simple Mail Transfer Protocol

90
Q

What does WSA stand for?

A

Web Security Appliance

91
Q

Guarantees that the sender cannot repudiate, or refute, the validity of a message sent.

A

Data Non-Repudiation

92
Q

___ functions are used to ensure the integrity of a message. They guarantee that message data has not changed accidentally or intentionally

A

Hash

93
Q

What are the three well-known hash functions?

A

MD5 with 128-bit Digest (Legacy)
SHA Hashing Algorithm (Legacy)
SHA-2

94
Q

HMAC

A

hash message authentication code

95
Q

Encryption class where they use the same pre-shared key, also called a secret key, to encrypt and decrypt data. A pre-shared key is known by the sender and receiver before any encrypted communications can take place.

A

Symmetric Encryption

96
Q

_____ algorithms, also called public-key algorithms, are designed so that the key that is used for encryption is different from the key that is used for decryption.

A

Asymmetric

97
Q

What does IKE stand for?

A

Internet Key Exchange

98
Q

What does SSL stand for?

A

Secure Socket Layer

99
Q

This protocol provides a secure remote access connection to network devices

A

Secure Shell (SSH)

100
Q

This computer program provides cryptographic privacy and authentication. It is often used to increase the security of email communications.

A

Pretty Good Privacy (PGP)

101
Q

An asymmetric mathematical algorithm where two computers generate an identical shared secret key without having communicated before. The new shared key is never actually exchanged between the sender and receiver.

A

Diffie-Hellman (DH)

102
Q

Role of the red team in pen testing?

A

Offensive team

103
Q

Role of the blue team in pen testing?

A

defense team

104
Q

Role of the purple team in pen testing?

A

offense and defense

105
Q

Role of the white team in pen testing?

A

arbiters

106
Q

Role of the yellow team in pen testing?

A

builders

107
Q

Role of the orange team in pen testing?

A

offensive and builders

108
Q

Role of the green team in pen testing?

A

defense and builders

109
Q

What does MFA mean?

A

Multi-Factor Authenticator

110
Q

Phishing in SMS

A

Smishing

111
Q

Phishing in voice or calls

A

vishing

112
Q

What does IP stand for?

A

Internet Protocol

113
Q

What does ARP stand for?

A

address resolution protocol

114
Q

What does DNS stand for?

A

domain name system/service

115
Q

What does DHCP stand for?

A

dynamic host configuration protocol

116
Q

What does FTP stand for?

A

file transfer protocol

117
Q

What does TFTP stand for?

A

trivial FTP

118
Q

What does NFS mean?

A

network file system

119
Q

What does VoIP mean?

A

voice over IP

120
Q

What does VoLTE stand for?

A

voice over long term evolution

121
Q

What does IPS stand for?

A

Intrusion Prevention System

122
Q

What does IDS stand for?

A

Intrusion Detection System