Network + Ch1 Flashcards

1
Q

What is Typosquatting?

A

URL hijacking where a malicious domain mimics a legitimate one(g00gle vs google.com)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How does Pretexting work?

A

The attacker creates a false story to trick a victim into giving up sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Pharming?

A

A poisoned DNS redirects users to fake websites instead of legitimate ones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Vishing?

A

Voice phishing using spoofed numbers to extract information via phone calls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the difference between Smishing and Spear Phishing?

A

Smishing is phishing through SMS, while Spear phising is a targeted phishing attack on specific individuals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Whaling?

A

A form of spear phishing targeting high-profile individuals, like CEOs or executives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define Watering Hole Attack

A

Infects websites commonly visited by a specific group to target those users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Tarpitting?

A

Intentionally slowing down server responses to discourage spam or malicious attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What makes a Worm different from a Virus?

A

A worm self-replicates without user interaction, while a virus requires user action to spread.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a Fileless Virus?

A

Malware that runs in memory without leaving files on the disk, making it hard to detect?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can you protect against Ransomware?

A

Maintain offline backups not connected to the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a Logic Bomb?

A

Malicious code triggered by a specific event or date

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a Spraying Attack?

A

An attack using common passwords only a few times to avoid detection or lockout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are Rainbow Tables used for?

A

Precomputed hash chains used to crack passwords quickly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a Birthday Attack?

A

An attack that exploits hash collisions to find two inputs with the same hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is Cross-Site Scripting(XSS)?

A

An attack that injects JavaScript into a website to steal information or manipulate content.

17
Q

What is the difference between Persistent and Non-Persistent XSS?

A

Persistent XSS stores malicious scripts permanently on the website, while Non-Persistent XSS injects them temporarily

18
Q

What is an LDAP Injection Attack?

A

An attack that manipulates LDAP queries to access unauthorized data

19
Q

What is Pass the Hash?

A

A replay attack where an intercepted hash is reused to authenticate without cracking it.

20
Q

What is Bluejacking?

A

Sending unsolicited messages over Bluetooth to other devices

21
Q

What is Bluesnarfing?

A

Accessing data from a mobile device via Bluetooth without permission

22
Q

What are Rules of Engagement in penetration testing?

A

They define the scope, purpose, and limitations of a penetration test

23
Q

What is Wardriving?

A

Driving around to search for open WiFi networks using specialized tools.

24
Q

What is UEBA used for?

A

User and Entity Behavior Analytics monitors network activity to detect unusual behavior patterns

25
Q

What is SOAR?

A

Security Orchestration, Automation and Response automates repetitive security tasks and responses

26
Q
A