Security Plus Flashcards

1
Q

Attack an account with the top three (or more) passwords. If they don’t work, move to the next account. No lockouts, no alarms, no alerts.

A

Spraying attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

They identify patterns in data and improve their predictions.

A

Machine Learning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Gain higher-level access to a system. Horizontal privilege escalation User A can access user B resources.

A

Privilege escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Attacker embeds malicious scripting commands on a trusted website.

A

Cross-Site Scripting (XSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Attempts to get data provided by the attacker to be saved on the web server by the victim. Attacker posts a message to a social network with malicious payload.

A

Cross-Site Scripting (Stored/Persistent)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Attempts to have a non-persistent effect activated by a victim clicking a link on the site. Attacker emails a link that takes advantage of this vulnerability. Runs a script that sends credentials/session IDs/cookies to the attacker.

A

Cross-Site Scripting (Reflected)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Attack consisting of the insertion or injection of an SQL query data from the client to a web application.

A

SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Insertion of additional information or code through data input from a client to an application. Examples, SQL, HTML, XML, and LDAP.

A

Injection Attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What injection attack is prevented through input validation and using least privilege when accessing a database.

A

SQL injection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

’ OR 1=1

A

SQL Injection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Application verify that information received from a user matchers a specific format or range of value.

A

Input Validation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Occurs when a process stores data outside the memory range allocated by the developer

A

Buffer Overflows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Network-based attack where a valid data transmission is fraudulently or malicious rebroadcast, repeated, or delayed.

A

Replay Attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A technique that allows an attacker to authenticate to a remote server or service by using the underlying NTLM or LM hash instead of requiring the associated plaintext password.

A

Pass the Hash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Attacker intercepts the session ID and uses it to access the server with the victim’s credentials.

A

Session Hijacking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Occurs when an attacker forces a user to execute actions on a web server for which they are already authenticated.

A

Cross-site Request Forgery (XSRF/CSRF)

17
Q

Shimming (filling space between two objects) and Refactoring (different program each times its downloaded.

A

Driver Manipulation

18
Q

Time synchronization

A

Network Time Protocol (NTP)

19
Q

Vulnerability is found where multiple threads are attempting to write a variable or object at the same memory locations.

A

Race condition

20
Q

Able to read file from a web server that are outside of the websites file directory.

A

Directory traversal.

21
Q

A library of programming utilities used to enable software developers to access functions of another application.

A

API (Application Programming Interface.

22
Q

An unauthorized WAP or Wireless Router that allows to the secure network.

A

Rogue Access Point.

23
Q

A rogue, counterfeit, and unauthorized WAP with the same SSID as your valid one.

A

Evil Twin.

24
Q

Sending of unsolicited messages to BLuetooth enabled devices such as mobile phones and tablets.

A

Bluejacking

25
Q

Unauthorized access of information from a wireless device through a Bluetooth connection.

A

Bluesnarfing

26
Q

Focuses on learning as much information from open sources such as social media. corporate websites, and business organizations.

A

Passive footprinting.

27
Q

Privacy Information Management Systems (PIMS)

A

(International Organization for Standardization) ISO 27001

28
Q

Information security controls are the focus for international standards.

A

ISO 27002

29
Q

The foundational standard for Information Management Systems (ISMS)

A

ISO 27701

30
Q

International standards for risk management.

A

ISO 31000

31
Q

Response designed to make security teams more effective by automating process and integrating 3rd party security tools.

A

SOAR (Security Orchestration, Automation, and Response)

32
Q

Allowing members of one organization to authenticate using the credentials of another organization.

A

Federation.

33
Q

Attack commonly associated with wireless networks, and they usually cause disconnects and lack of connectivity. Network outage or disconnection.

A

Disassociation.

34
Q

Attack often associated with a 3rd-party who is actively intercepting network traffic. Entity in the middle would not be able to provide a valid SSL certification for a 3rd party website, and certification error will appear in the browser as a warning.

A

On-path

35
Q

Prediction of how often a repairable system will fail.

A

MTBF (Mean Time Between Failures).

36
Q

A det of objectives needed to restore a particular service level.

A

Recovery Time Objectives.

37
Q

The amount of time it takes to repair a component.

A

MTTR (Mean Time to Restore).

38
Q

The expected lifetime of a non-repairable product or system.

A

MTTF (Mean Time to Failure).

39
Q

Attack that takes advantage of authority and urgency principle in an effort to convince someone else to circumvent normal security controls.

A

Social Engineering.