sec + pt3 Flashcards

1
Q

An Attacker sends multiple SYN packets from multiple sources

Attack identified
-Botnet
-RAT
-Logic Bomb
-Backdoor
-Virus
-Spyware
-Worm
-Adware
-Ransomware
-Keylogger
-Phishing

Best Preventative or remediation Action
-Enable DDOS protection
-Patch Vulnerable systems
-Disable vulnerable services
-change the default system password
-update the cryptographic algorithms
-Change the default application password
-Implement 2FA using push notifications
-Conduct a code review
-implement application fuzzing
-Implement a host-based IPS
-Disable remote access services.

A

Attack Identified
-Botnet

Best Preventative or Remediation action
-Enable DDos protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The attacker establishes a connection, which allows remote commands to be executed

Attack identified
-Botnet
-RAT
-Logic Bomb
-Backdoor
-Virus
-Spyware
-Worm
-Adware
-Ransomware
-Keylogger
-Phishing

Best Preventative or remediation Action
-Enable DDOS protection
-Patch Vulnerable systems
-Disable vulnerable services
-change the default system password
-update the cryptographic algorithms
-Change the default application password
-Implement 2FA using push notifications
-Conduct a code review
-implement application fuzzing
-Implement a host-based IPS
-Disable remote access services.

A

Attack Identified
-RAT

Best Preventative or Remediation Action
-Disable remote access services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The attack is self propagating and compromises a SQL database using well-known credentials as it moves through the network.

Attack identified
-Botnet
-RAT
-Logic Bomb
-Backdoor
-Virus
-Spyware
-Worm
-Adware
-Ransomware
-Keylogger
-Phishing

Best Preventative or remediation Action
-Enable DDOS protection
-Patch Vulnerable systems
-Disable vulnerable services
-change the default system password
-update the cryptographic algorithms
-Change the default application password
-Implement 2FA using push notifications
-Conduct a code review
-implement application fuzzing
-Implement a host-based IPS
-Disable remote access services.

A

Attack Identified
-Virus

Best Preventative or Remediation Actions
-Patch Vulnerable systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The attacker uses hardware to remotely monitor a user’s input activity to harvest credentials

Attack identified
-Botnet
-RAT
-Logic Bomb
-Backdoor
-Virus
-Spyware
-Worm
-Adware
-Ransomware
-Keylogger
-Phishing

Best Preventative or remediation Action
-Enable DDOS protection
-Patch Vulnerable systems
-Disable vulnerable services
-change the default system password
-update the cryptographic algorithms
-Change the default application password
-Implement 2FA using push notifications
-Conduct a code review
-implement application fuzzing
-Implement a host-based IPS
-Disable remote access services.

A

Attack Identified
-Keylogger

Best Preventative or Remediation Action
-Implement 2FA using push notification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The attacker embeds hidden access in an internally developed application that bypasses account login

Attack identified
-Botnet
-RAT
-Logic Bomb
-Backdoor
-Virus
-Spyware
-Worm
-Adware
-Ransomware
-Keylogger
-Phishing

Best Preventative or remediation Action
-Enable DDOS protection
-Patch Vulnerable systems
-Disable vulnerable services
-change the default system password
-update the cryptographic algorithms
-Change the default application password
-Implement 2FA using push notifications
-Conduct a code review
-implement application fuzzing
-Implement a host-based IPS
-Disable remote access services.

A

Attack Identified
-Backdoor

Best Preventative or Remediation Action.
-Conduct a code review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly