Session 06: Cyber Attacks Flashcards

1
Q

What are the types of cyber attacks?

A
  1. DNS Tunneling
  2. DoS and DDoS
  3. Man in the middle
  4. Phishing
  5. Ransomware
  6. SQL Injection
  7. XSS
  8. Malware
  9. Session Hijacking
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Famous cyber attacks

A
  1. Russian/Ukraine conflict
  2. Apache Log4j Vulnerability
  3. SolarWinds Sunburst attack
  4. Kaseya Ransomware attack
  5. Amazon DDoS attack
  6. Microsoft Exchange Remote Code Execution Attack
  7. Twitter Celebrities Attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DNS Tunneling

A

Hackers implant harmful code or software within what seems like a DNS request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DoS and DDoS

A

Denial of Service / Distributed Denial of Service
Overwhelm a system’s resources until it can no longer respond to legitimate service requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Man-in-the-middle

A

Allow an attacker to intercept data exchange between two people, network or computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Phishing

A

Sends an email that appears to come from a trusted and legitimate source in a attempt to obtain sensitive information from a target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Ransomware

A

Victim’s system or data is held hostage until the victim agrees to pay the attacker a ransom.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SQL Injection

A

Use SQL queries sent from the client to a database on the server. Commands are inserted or injected into the data plane.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

XSS

A

Cros Site Scription
Send malicious scripts with clickable content to the target browser. Once the victim clicks on the content, the script will be executed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Malware

A

Enters network through vulnerabilities when users click on unsafe links or email attachments to install unsafe software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Session Hijacking

A

One of many types of MITM attacks. Attacker hijacks the session between the client and server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly