quiz Flashcards

1
Q

Subnet Spoofing

A

Generate random addresses within a given address space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Random Spoofing

A

Generate 32-bit numbers and stamp packets with them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fixed Spoofing

A

The spoofed address is the address of the target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Server Application DOS attack

A

The attack is targeted to a specific application on a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Network Access DOS attack

A

The attack is used to overload or crash the communication mechanism of a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Infrastructure DOS attack

A

The motivation of this attack is a crucial service of a global internet operation, for example core router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Random Scanning

A

Each compromised computer probes random addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Permutation Scanning

A

All compromised computers share a common pseudo-random permutation of the IP address space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Signpost Scanning

A

Uses the communication patterns of the compromised computer to find new target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hitlist Scanning

A

A portion of a list of targets is supplied to a compromised computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of these are the reasons why the UDP-based NTP protocol is particularly vulnerable to amplification attacks?

A

A small command can generate a large response.
Vulnerable to source IP spoofing.
It is difficult to ensure computers communicate only with legitimateNTP servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The server must reject all TCP options because the server discards the SYN queue entry. T or F?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

With regards to a UDP flood attack, which of the following statements are true

A

Attackers can spoof the IP address of their UDP packets. Firewalls cannot stop a flood because the firewall is susceptible to flooding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Client puzzles should be stateless. T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Puzzle complexity should increase as the strength of the attack increases. TF

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the folloiwing are assumptions that can be made about Traceback?

A

Attackers may work alone or in groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Select all the statements that are true for the edge sampling:

A

Multiple attackers can be identified since edge identifies splits in reverse path.
Requires space in IP packet header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Self defense against reflector attacks should incorporate:

A

Server redundancy- servers should be located in multiple networks and locations.
Traffic limiting - traffic from a name server should be limited to reasonable tresholds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Deep web

A

It is not indexed by standard search engines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Dark web

A

Web content that exists on darknets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Surface web

A

Readily available to the public, and searchable with standard search engines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Doorway pages

A

A webpage that lists many keywords, in hopes of increasing search engine ranking. Scripts on the page redirect to the attackers page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Crypters

A

A program that hides malicious code from anti virus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Blackhat search engine optimizer

A

It increases traffic to the attacker’s site by manipulating search engine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Trojan download manager

A

Software that allows an attacker to update or install malware on a victim’s computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are the two defining characteristics of the internet spam?

A

Inappropriate or irrelevant

Large number of recipients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Name the top three countries where spam directed visitors added items to their shopping cart

A

US
Canada
Philippines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which events should trigger a penetration test

A

Apps are addred or modified
End user policies are changed
Security patches are installed
Infrastructure is added or modified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

List the steps attackers use to access RSA adobe flash software

A

Identify employees are vulneralbe
Craft an email subject line that entices an employee to open it
Hide an executable file in the email that will install onto the victim’s computer when email is opened

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Flash or CD autoplay attack

A

A flash is created that has a program that creates a connection to the exploit server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Reverse shell applet attack

A

A signed JAVA applet is sent to the user, if they accept it, a shell is sent back to the exploit server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Click logger attack

A

Used to determine which users click on links in emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Download connection attack

A

An email contains an attachment, when the attackment is downloaded an connection is made to the exploit server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

ON the pie chart, what are the top 3 industries that were targets in 2016?

A

Defense contractor
restaurant
software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Tier one

A

A network can reach every other network through peering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Tier 2

A

A network that peers some of its network access and purchases some of it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Tier 3

A

A netowkr that purchases all transit from other networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

ip PROVIDES ONLY BEST EFFORT DELIVERY, ITS NOT GUARANTEED

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Due the connectionless nature of IP, data corruption, packet loss, dupelication, and out of order delivery can occur

A

True

40
Q

Network layer controls can protect data within the packets as well as the IP info for each packet

A

True

41
Q

IP information cannot be protected by transport layer controls

A

True

42
Q

Address resolution protocol (ARP)

A

Protocol designed to map IP network addresses to the hardware address used by a data link protocol

43
Q

Open shortest path first (OSPF)

A

protocol uses a link state routing algorithm and falls into the group of interior routing protocols

44
Q

Border gateway protocol (BGP)

A

protocol designed to exchange routing and reachability information among autonomous system(AS)

45
Q

Denial of service

A

Create a false route or kill a legitimate one

46
Q

Sniffing

A

The attacker must control a device along the victim’s commuinication path

47
Q

Routing to endpoints in malicious networks

A

The first step is to hijack traffic from a legitimate host

48
Q

Creating route instabilities

A

Not yet used by hackers because damage cannot be contained. it can blockback to the attacker

49
Q

Revelation of network topologies

A

Unmasking the AS relationships by hacking the routing table

50
Q

Domain name

A

A name in the DNS format

51
Q

DNS zone

A

A set of names under the same authority (ie “.com”)

52
Q

Delegation

A

Transfer of authority for/to a subdomain

53
Q

changing a domain name into an IP address involves a large number of steps. To save time, the records are <> on a local server for reuse later

A

Cached

54
Q

Each record hs a <> that states how long a record can be kept for future use

A

TTL

55
Q

All domain names and IP addresses are stored at the central registry

A

True

56
Q

It can take several days for information to propagete to all DNS servers

A

TRUE

57
Q

The attacker’s server responds with a short TTL record, the attacker needs to register a domain and delegate it to a server under his control. The attacker exploits the smae origin policy

A

True

58
Q

Using components with known vulnerabilities

A

Uses unpatched third party components

59
Q

Missing function level access control

A

Privileage functionality is hidden rather than enforced through access controls

60
Q

Sensitive data exposure

A

Abuses lack of data encryption

61
Q

Insecure direct object references

A

Attacker modify file names

62
Q

Security misconfiguration

A

exploits misconfigured servers

63
Q

cross site scripting

A

insert javascript into trusted sites

64
Q

Broken authentication and session

A

program flaws allow bypass of authentication methods

65
Q

Injection

A

modifies back end statement through user input

66
Q

Given the list of attributes, which 2 should not be combined? put a check next to the 2 attributes that should not be combined in sandbox

A

allow same origin

allow scripts

67
Q

CSP will allow third party widgets( eg Google +1 button) to be embedded on your site

A

True

68
Q

If you have thrid party forum software that has inline script, CSP cannot be used

A

False

69
Q

CORS allows cross-domain communication from the brwoser

CORS requires coordination between server and client

A

True

70
Q

CORS is not widely supported by browsers

The cors header can be used to secure resources on a website

A

false

71
Q

The token must be stored somewhere

Tokens expire, but there should be mechanisms to revoke them if necessary

A

true

72
Q

Active session hijacking involves disconnecting the user from the server once that user is logged on. Social engineering is required to perform this type of hijacking

A

true

73
Q

Select all the items that can be encrypted by HTTPS

A

Request URL
Query paramaters
Headers
Cookies

74
Q

Which of the following are real disadvantages to useing HTTPS

A

You need to buy an SSL cert
Mixed modes issue-loading insecure content on a secure site
proxy cahcing problems - prublic caching cannot occur

75
Q

According to Wikipedia, which of these devices is a mobile device

A

Smart phone held by person
Self driving car
robot

76
Q

list 4 areas of the C based toolchain where ahrdening can occur

A

Configuration
Preprocessor
Compiler
Linker

77
Q

Which of these behaviors are indiciative of botnets

A

Linking to an extablished C&C server
Generating Internet relay chat (IRC) traffic using specific range of ports
Generating SMTP emails /traffic
Reducing/ Generating simultaneous identical DNS requests is suspicious

78
Q

what can botnets to evade C-plane clustering

A
Manipulate communication patterns.
Introduce noise (in the form of random packets) to reduce similarity between C&amp;C flows
79
Q

What can botnets do to evade A plane monitoring

A

Perform slow spamming

Use undetectable activities (spam sent with Gmail, download exe from https server)

80
Q

Which of the information should be considered in order to identify the source (perp) of an APT attack?

A

Source IP address of TCP-based attack packets
Coding syle of malware
Inclusion of special libraries with known authors
motives of the attack
language encoding

81
Q

Footprinting (FP)

A

The attacker gathers information about a target.

The kind of information gathered is DNS, email, servers, and the IP address range

82
Q

Scanning (S)

A

The attacker uses the internet ot obtain information on specific IP addresses. The kind of information gathered is OS, Services, and architecture of the target system

83
Q

Enumeration (E)

A

The attacker gathers information on the network user and group names, routing tables, and simple network management protocol.

84
Q

Which protocl is used to break data into packets? which protocol reassembles the data packets?

A

TCP

85
Q

Which protocol is used to mobve packets from router to router

A

IP

86
Q

why does ZMap find more hosts than nmap

A

Statelessness leads to both higher performance and increased coverage

87
Q

With regard to computing, what is entropy?

A

Randomness for use in cryptgraphy or other applications that require random data

88
Q

what are the two sources of entropy?

A

Hardware sources and randomness generators.

89
Q

A lack of entropy will have a negative impact on performance and security

A

True

90
Q

NoBL DNSBL level

A

This IP address does not send spam, and should not be blacklisted. But it is not fully trustworty

91
Q

GREY DNSBL level

A

This ip address is not directly involved in spamming but is associated with spam like behaviours

92
Q

Yellow DNSBL level

A

THis ip address is known to produce spam and non spam email

93
Q

Botnets

A

Short lived domains

94
Q

Spyware

A

Anonymously registered domains

95
Q

Adware

A

Disposable domains

96
Q

List the types of characters a malicuious domain name detection program should look in for a domain name

A

Number of characters, hyphens, digits

97
Q

Network based features

A

Quantities such as the total nubmer of IPs historically assicoated with the diversity of their geographical locations, the number of distinct autonomous systems