sec + pt3 Flashcards
An Attacker sends multiple SYN packets from multiple sources
Attack identified
-Botnet
-RAT
-Logic Bomb
-Backdoor
-Virus
-Spyware
-Worm
-Adware
-Ransomware
-Keylogger
-Phishing
Best Preventative or remediation Action
-Enable DDOS protection
-Patch Vulnerable systems
-Disable vulnerable services
-change the default system password
-update the cryptographic algorithms
-Change the default application password
-Implement 2FA using push notifications
-Conduct a code review
-implement application fuzzing
-Implement a host-based IPS
-Disable remote access services.
Attack Identified
-Botnet
Best Preventative or Remediation action
-Enable DDos protection
The attacker establishes a connection, which allows remote commands to be executed
Attack identified
-Botnet
-RAT
-Logic Bomb
-Backdoor
-Virus
-Spyware
-Worm
-Adware
-Ransomware
-Keylogger
-Phishing
Best Preventative or remediation Action
-Enable DDOS protection
-Patch Vulnerable systems
-Disable vulnerable services
-change the default system password
-update the cryptographic algorithms
-Change the default application password
-Implement 2FA using push notifications
-Conduct a code review
-implement application fuzzing
-Implement a host-based IPS
-Disable remote access services.
Attack Identified
-RAT
Best Preventative or Remediation Action
-Disable remote access services
The attack is self propagating and compromises a SQL database using well-known credentials as it moves through the network.
Attack identified
-Botnet
-RAT
-Logic Bomb
-Backdoor
-Virus
-Spyware
-Worm
-Adware
-Ransomware
-Keylogger
-Phishing
Best Preventative or remediation Action
-Enable DDOS protection
-Patch Vulnerable systems
-Disable vulnerable services
-change the default system password
-update the cryptographic algorithms
-Change the default application password
-Implement 2FA using push notifications
-Conduct a code review
-implement application fuzzing
-Implement a host-based IPS
-Disable remote access services.
Attack Identified
-Virus
Best Preventative or Remediation Actions
-Patch Vulnerable systems
The attacker uses hardware to remotely monitor a user’s input activity to harvest credentials
Attack identified
-Botnet
-RAT
-Logic Bomb
-Backdoor
-Virus
-Spyware
-Worm
-Adware
-Ransomware
-Keylogger
-Phishing
Best Preventative or remediation Action
-Enable DDOS protection
-Patch Vulnerable systems
-Disable vulnerable services
-change the default system password
-update the cryptographic algorithms
-Change the default application password
-Implement 2FA using push notifications
-Conduct a code review
-implement application fuzzing
-Implement a host-based IPS
-Disable remote access services.
Attack Identified
-Keylogger
Best Preventative or Remediation Action
-Implement 2FA using push notification
The attacker embeds hidden access in an internally developed application that bypasses account login
Attack identified
-Botnet
-RAT
-Logic Bomb
-Backdoor
-Virus
-Spyware
-Worm
-Adware
-Ransomware
-Keylogger
-Phishing
Best Preventative or remediation Action
-Enable DDOS protection
-Patch Vulnerable systems
-Disable vulnerable services
-change the default system password
-update the cryptographic algorithms
-Change the default application password
-Implement 2FA using push notifications
-Conduct a code review
-implement application fuzzing
-Implement a host-based IPS
-Disable remote access services.
Attack Identified
-Backdoor
Best Preventative or Remediation Action.
-Conduct a code review