Security+ Practice Tests 1-5 Flashcards
Registering a misspelled domain name in the hopes of getting traffic from unsuspecting users who type the URL in wrong.
URL hijacking
AKA typosquatting
Attaching a piece of data to the beginning of another
Prepending
A form of cyberattack that targets a group of users by infecting websites that they commonly visit.
Watering hole attack
What is the platform for watering hole attacks?
Websites
Where does a fileless virus reside?
RAM
What is the function of a C2 server?
Botnet control
A computer controlled by an attacker used to send commands to systems compromised by malware.
C2 (Command and Control) server
Malware that restricts access to a computer system by encrypting data.
Cryptomalware
A type of trojan that enables remote access to a compromised system.
RAT (Remote Access Trojan)
A collection of software tools used by a hacker to mask intrusion and obtain administrator-level access to a computer or computer network.
Rootkit
Which attack uses a short list of commonly used passwords tried against a large number of user accounts?
Spraying attack
The practice of making an unauthorized copy of a payment card.
Cloning
An AI feature that enables it to accomplish tasks based on training data without explicit human instructions.
ML (machine learning)
When a hashing algorithm produces the same hash value for two distinct pieces of data.
Hash collision.
A cryptographic attack that forces a network protocol to revert to its older, less secure version.
Downgrade attack
A means of restricting access to system resources based on the sensitivity of the information and the clearance of users to access information of such sensitivity.
MAC (Mandatory Access Control)
Which attack would use this string?:
SELECT * FROM users WHERE userName=’Alice’ AND password =” OR ‘1’=’1’;
SQL injection
A collection of precompiled functions designed to be used by more than one Microsoft Windows application simultaneously to save system resources.
DLL (dynamic link library)
A type of application attack that relies on executing a library of code.
DLL injection
Which type of attack would use these bits of string?:
Administrator)&))
Search.aspx?name=username)(zone=*)
LDAP injection attack
A vulnerability in which queries are constructed from untrusted input without proper validation or sanitization.
LDAP injection
A protocol that makes it possible for applications to query user information.
LDAP (lightweight directory access protocol)
Which type of attack would use this string?
…p@$$w0rd</password></user><user><name>attacker</name></user>
XML injection attack
A language format that’s commonly used for storing, transmitting, and reconstructing data.
A software- and hardware-independent tool for storing and transporting data.
XML (extensible markup language)
For example:
<note>
<to>Tove</to>
<from>Jani</from>
<heading>Reminder</heading>
<body>Don't forget me this weekend!</body>
</note>