Social Engineering Flashcards

1
Q

(pr) What is a layer

A

A division of network functuality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

(pr) Name an advantage of layers

A

It is self contained- if one layer is removed it does not affect the other layers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

(pr) Name a way that affects a network

A

Physical interference/ number of devices/ bandwidth/ distance data has to travel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(pr) Name a difference between a switch and a router

A

a switch uses MAC addresses whereas a router uses IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does SQL stand for?

A

Structured Query Language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the primary use of SQL?

A

To interact with databases by retrieving, inserting, updating, and deleting data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an SQL injection?

A

A technique where an attacker inserts malicious SQL code into a website’s input field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can an SQL injection attack exploit a website?

A

By manipulating SQL queries to gain unauthorized access to or modify sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What did the hacker do to test the vulnerability of the search bar?

A

Entered a string of SQL code into the search box instead of a product name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the consequence of not properly validating user input in SQL?

A

Malicious code can be processed directly by the database, leading to data exposure or manipulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What should input validation check for to prevent SQL injection?

A

That the input does not contain malicious SQL statements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is one way to restrict SQL query execution and prevent SQL injection?

A

Restricting the types of SQL statements that can be executed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are user access levels?

A

Permissions set for different types of users to limit access to sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What action did the IT team take after discovering the breach?

A

Launched an investigation into the website’s security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What was the main finding of the IT team’s investigation?

A

Inadequate input validation allowed SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What immediate action did the IT team take to fix the issue?

A

Implemented input validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Why is error handling important in web applications?

A

To prevent detailed error messages from being displayed to users, which could aid attackers

18
Q

What does penetration testing involve?

A

Simulating real-world cyberattacks to test system security defences

19
Q

What is a key benefit of conducting regular security audits?

A

To identify and fix vulnerabilities before they can be exploited

20
Q

Fill in the blank: SQL injection attacks exploit vulnerabilities in user input validation to manipulate SQL queries and access _______.

A

sensitive data

21
Q

True or False: User access levels can help limit the damage a hacker can do.

22
Q

What is a best practice for securing web applications mentioned in the case study?

A

Regularly updating software and using strong encryption for sensitive data

23
Q

What is a virus?

A

A form of malicious software that attaches itself to files or programs, allowing it to spread to other files and programs when the infected file is executed.

Viruses can cause harmful effects such as corrupting or deleting data, slowing down system performance, and disrupting operations.

24
Q

How do viruses typically enter systems?

A

Through infected email attachments, downloads from untrusted websites, or physical media like USB sticks.

User execution of infected files activates the virus code.

25
What is the main function of a virus?
To replicate itself and spread to other systems, potentially causing damage to data and files. ## Footnote Viruses exploit user trust in seemingly harmless files.
26
What is an example of a well-known virus?
The 'ILOVEYOU' virus, which spread rapidly in 2000 via email. ## Footnote It caused an estimated $10 billion in damages.
27
What distinguishes worms from viruses?
Worms do not require a host file to spread and can replicate and transmit themselves without user intervention. ## Footnote Worms cause network congestion and operational disruption.
28
What is a notorious example of a worm?
The 'Morris Worm,' released in 1988, which infected around 6,000 computers. ## Footnote It exploited vulnerabilities in Unix systems.
29
What is a Trojan horse?
A type of malware that disguises itself as useful software to trick users into downloading and installing it. ## Footnote Trojans rely on social engineering techniques.
30
How do Trojans typically operate once executed?
They can create a backdoor for remote access, allowing attackers to control the infected system. ## Footnote Trojans can lead to data breaches and identity theft.
31
What is a well-known example of a Trojan?
The 'Zeus Trojan,' used to steal banking information and credentials. ## Footnote It captures sensitive data and transmits it to attackers.
32
What is spyware?
A category of malware designed to monitor user activity and collect personal information without consent. ## Footnote Spyware can track browsing habits, keystrokes, and capture sensitive data.
33
How does spyware typically enter systems?
Through bundled software downloads, deceptive websites, or exploiting vulnerabilities in operating systems. ## Footnote It compromises user privacy and degrades system performance.
34
What is a notorious example of spyware?
The 'CoolWebSearch' spyware, which hijacked web browsers and changed search settings without consent. ## Footnote It collected data on users' browsing habits.
35
What is ransomware?
A type of malware that encrypts the victim's files and demands a ransom for the decryption key. ## Footnote Ransomware inflicts severe emotional and financial distress on victims.
36
How does ransomware typically infiltrate systems?
Through phishing emails, malicious downloads, or by exploiting software vulnerabilities. ## Footnote User caution is essential for prevention.
37
What is a prime example of ransomware?
The 'WannaCry' attack that occurred in 2017. ## Footnote It affected hundreds of thousands of computers worldwide by exploiting a Microsoft Windows vulnerability.
38
Fill in the blank: A virus can cause _______ to data and files.
harmful effects
39
True or False: Worms require a host file to spread.
False
40
Fill in the blank: Spyware collects personal information without the user's _______.
knowledge or consent
41
True or False: Trojans replicate themselves like viruses.
False