Recognizing Security Threats Flashcards

1
Q

Ping of death and Unreachable gateway are two types of what?

A

DOS attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What feature of loadbalancers can be employed to mitigate DDoS attacks?

A

TCP SYN cookie option

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what type of permanent DoS attack can be done remotely?

A

Phlashing denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what type of DoS attack involves spoofing a victim’s IP address to send large of number of pings to the network broadcast address so that the victims machine will be overwhelmed with the responses?

A

Smurfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

list the steps of a SYN Flood DoS attack

A

1) attacker sends SYN with flag set to 1
2) server responds with SYN-ACK and reserves memory waiting for response
3) attacker does not respond and instead sends another SYN and continues until memory is used up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which type of DDoS attack tool incorporates Tribal Flood Network techniques

A

Stacheldraht

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What two techniques enhance the effectiveness of a DoS attack?

A

Reflective/Amplified

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DNS amplification attack works by the attacker sending what to an open resolver (DNS server)? Then what happens?

A

the attacker sends a small DNS message using the victim’s IP address as the source. It returns all known information about the DNS zone to the victim’s server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which version of NTP can prevent an NTP reflection attack?

A

4.2.7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What packet/protocol abuse software is used by attackers to by-pass firewall restrictions? How does it do it?

A

Iodine

It allows IPv4 traffic to be encapsulated in DNS packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

list 5 types of spoofing

A

1) ARP spoofing (attacker’s MAC becomes the gateway)
2) MAC spoofing (forges MAC address)
3) IP Spoofing
4) Email Spoofing
5) DNS spoofing (cache poisoning)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What simple technique can be applied to defeat brute force attacks?

A

Setting an account lock-out policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Session Fixation, Session Sidejacking and Cross-site scripting are techniques used in what type of attack?

A

Session Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what type of session hijacking involves an attacker setting the session ID ahead of time then disconnecting the user after authentication has completed to steal their ID?

A

Session Fixation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

an attacker steals the session key from memory on the victim’s computer, what attack is this called?

A

Session sidejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

In VLAN tagging, what does the attacker do?

A

They place a fake VLAN tag into the packet along with the real tag - double tagging.

17
Q

What accounts should be disabled as default?

A

default administrator accounts

18
Q

what type of malware executes when a particular event takes place and can be used to foist forensic investigations?

A

Logic Bombs

19
Q

viruses don’t need any action taken by the user but worms do - TRUE or FALSE?

A

FALSE, Worms don’t need assistance.

20
Q

Placing limits of sharing, writing and executing programs can help mitigate what type of security threat?

A

Worms

21
Q

how do file virus do their damage?

A

By replacing some or all of the target program’s code with it’s own. Only when it is executed can it work.

22
Q

Missing Operating System or Hard Disk Not Found are symptoms of what?

A

Boot-Sector virus

23
Q

What type of security threat can the below two principles mitigate?

1) Principle of Least Privilege
2) Separation of Duties

A

Insider Threat

24
Q

To mitigate insider threats, what should you do when an employee has been terminated?

A

Remove all network access

25
Q

Once inside a network, how might an attack get TCP packets past the firewall and out of the network to communicate with their servers?

A

By encapsulating TCP packets in DNS or ICMP

26
Q

What type of attack involves taking advantage of a vulnerability that has not yet been patched?

A

Zero-day attack

27
Q

What is the Tribal Flood Network?

A

A set of computer programs used to conduct DDoS attacks.

28
Q

What’s the difference between a Rogue AP and an Evil Twin. What do hackers use them for?

A

A rogue access point is an unauthorized access point that has been installed on a network. A hacker will use it to gather information by using it sniff packets or simply access the wired network
Evil Twin is also a rogue access point but this use is slightly different. It is set up to mimic the SSID of a legitimate AP causing users to connect to it. It is not connected to a company’s network. Hackers use it to steal information the users enter when they browse the web.

29
Q

What does jamming involve?

A

an attacker using noise on the same frequency as the wireless signal. This prevents users connecting to the wireless network or intermittent connectivity.

30
Q

what attack attempts to discover the pre-shared key? How does it work? What security method is most susceptible to it?

A

Called Initialization Vector attack. The IV is a number and some security protocols use it a long with the pre-shared key to encrypt the transmission. If the attacker knows the IV they will discover the key.

Because the IV uses only a 24-bit number the likelihood of a repeat IV number is the same.

The attacker injects packets into the AP to increase the probability of a key being reused.

31
Q

What’s the name given to the practice of sending unsolicited messages to nearby bluetooth devices?

A

Bluejacking

32
Q

You’ve just used obexftp to steal information from someone’s phone, what have you just done?

A

Bluesnarfing

33
Q

How is bluebugging different to bluesnarfing?

A

Bluesnarfing involves stealing information from a phone over bluetooth connection, but Bluebugging installs a back door which allows the attacker to do things like make the hijacked phone call their phone so they can listen in on conversations in the same room.

34
Q

How do you reduce the chances of bluetooth attacks?

A

ensuring devices are paired manually

35
Q

Why is it called a replay attack?

A

because the attacker captures data, alters it, then re-sends or replays the data in attempt to impersonate one of the parties.

36
Q

What 3-types of attack is RFID susceptible to?

A

sniffing
replay
DoS