Security Plus Flashcards

(39 cards)

1
Q

Attack an account with the top three (or more) passwords. If they don’t work, move to the next account. No lockouts, no alarms, no alerts.

A

Spraying attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

They identify patterns in data and improve their predictions.

A

Machine Learning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Gain higher-level access to a system. Horizontal privilege escalation User A can access user B resources.

A

Privilege escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Attacker embeds malicious scripting commands on a trusted website.

A

Cross-Site Scripting (XSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Attempts to get data provided by the attacker to be saved on the web server by the victim. Attacker posts a message to a social network with malicious payload.

A

Cross-Site Scripting (Stored/Persistent)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Attempts to have a non-persistent effect activated by a victim clicking a link on the site. Attacker emails a link that takes advantage of this vulnerability. Runs a script that sends credentials/session IDs/cookies to the attacker.

A

Cross-Site Scripting (Reflected)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Attack consisting of the insertion or injection of an SQL query data from the client to a web application.

A

SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Insertion of additional information or code through data input from a client to an application. Examples, SQL, HTML, XML, and LDAP.

A

Injection Attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What injection attack is prevented through input validation and using least privilege when accessing a database.

A

SQL injection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

’ OR 1=1

A

SQL Injection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Application verify that information received from a user matchers a specific format or range of value.

A

Input Validation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Occurs when a process stores data outside the memory range allocated by the developer

A

Buffer Overflows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Network-based attack where a valid data transmission is fraudulently or malicious rebroadcast, repeated, or delayed.

A

Replay Attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A technique that allows an attacker to authenticate to a remote server or service by using the underlying NTLM or LM hash instead of requiring the associated plaintext password.

A

Pass the Hash.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Attacker intercepts the session ID and uses it to access the server with the victim’s credentials.

A

Session Hijacking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Occurs when an attacker forces a user to execute actions on a web server for which they are already authenticated.

A

Cross-site Request Forgery (XSRF/CSRF)

17
Q

Shimming (filling space between two objects) and Refactoring (different program each times its downloaded.

A

Driver Manipulation

18
Q

Time synchronization

A

Network Time Protocol (NTP)

19
Q

Vulnerability is found where multiple threads are attempting to write a variable or object at the same memory locations.

A

Race condition

20
Q

Able to read file from a web server that are outside of the websites file directory.

A

Directory traversal.

21
Q

A library of programming utilities used to enable software developers to access functions of another application.

A

API (Application Programming Interface.

22
Q

An unauthorized WAP or Wireless Router that allows to the secure network.

A

Rogue Access Point.

23
Q

A rogue, counterfeit, and unauthorized WAP with the same SSID as your valid one.

24
Q

Sending of unsolicited messages to BLuetooth enabled devices such as mobile phones and tablets.

25
Unauthorized access of information from a wireless device through a Bluetooth connection.
Bluesnarfing
26
Focuses on learning as much information from open sources such as social media. corporate websites, and business organizations.
Passive footprinting.
27
Privacy Information Management Systems (PIMS)
(International Organization for Standardization) ISO 27001
28
Information security controls are the focus for international standards.
ISO 27002
29
The foundational standard for Information Management Systems (ISMS)
ISO 27701
30
International standards for risk management.
ISO 31000
31
Response designed to make security teams more effective by automating process and integrating 3rd party security tools.
SOAR (Security Orchestration, Automation, and Response)
32
Allowing members of one organization to authenticate using the credentials of another organization.
Federation.
33
Attack commonly associated with wireless networks, and they usually cause disconnects and lack of connectivity. Network outage or disconnection.
Disassociation.
34
Attack often associated with a 3rd-party who is actively intercepting network traffic. Entity in the middle would not be able to provide a valid SSL certification for a 3rd party website, and certification error will appear in the browser as a warning.
On-path
35
Prediction of how often a repairable system will fail.
MTBF (Mean Time Between Failures).
36
A det of objectives needed to restore a particular service level.
Recovery Time Objectives.
37
The amount of time it takes to repair a component.
MTTR (Mean Time to Restore).
38
The expected lifetime of a non-repairable product or system.
MTTF (Mean Time to Failure).
39
Attack that takes advantage of authority and urgency principle in an effort to convince someone else to circumvent normal security controls.
Social Engineering.