SY0-701: 2.0 (Threats, Vulnerabilities, and Mitigations) Flashcards

1
Q

Vulnerability (2.3)

A

Any weakness in the system design or implementation (software bugs, misconfigures software. improperly protected network devices, missing security patches, lack of physical security)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Threat Actor Attributes (2.1)

A

Specific characteristics or properties that define and differentiate various threat actors from one another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Threat Actor (2.1)

A

Individual or entity responsible for incidents that impact security and data protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Threat Actor Types (2.1)

A

Unskilled Attackers- baby hackers
Hacktivists- driven by cause
Organized Crime- driven by money
Nation-State Actors- cyber warfare/espionage
Insider Threats- revenge or accidental

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Unskilled Attacker (2.1)

A

AKA Script Kiddie
Runs scripts w/ no knowledge of how it works

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Hacktivist (2.1)

A

Individuals or groups that use their technical skills to promote a cause or drive a social change instead of for personal gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Organized Crime (2.1)

A

Sophisticated and well-structured entities that leverage resources and technical skills for illicit gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Nation-State Actor (2.1)

A

Highly trained and often funded by nation states/governments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Insider Threat (2.1)

A

Cybersecurity threats that originate from within an organization (malicious or accidental)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Threat Actor Motivations (2.1)

A

Data exfiltration
Espionage
Service disruption
Blackmail
Financial gain
Philosophical/political beliefs
Ethical
Revenge
Disruption/chaos
War

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Threat Actor Attributes (2.1)

A

Internal / External
Resources / Funding (tools, skills, personnel)
Level of sophistication / Capability (technical skill, coimplexity of tools, ability to evade detection)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

False Flag Attack (2.1)

A

Attack that is orchestrated in such a way that it appears to originate from a different source or group (popular style w/ nation-state groups)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

APT (2.1)

A

Advanced Persistent Threat- Prolonged and targeted cyber attack in which an intruder gains unauthorized access to a network and remains undetected for an extended period of time while trying to steal data or monitor network activities rather than cause immediate damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Shadow IT (2.1)

A

The use of information technology systems, devices, software, applications, and services without explicit organizational approval

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Threat Vector (2.2)

A

Method used by an attacker to access a victim’s machine (e.g. a vulnerability; messages, images, files, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Attack Surface (2.2)

A

Encompasses all the various points where an unauthorized user can try to enter data to or extract data from an environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

BlueBorne (2.2)

A

Set of vulnerabilities in Bluetooth technology that can allow an attacker to take over devices or spread malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

BlueSmack (2.2)

A

Type of DOS attack that targets Bluetooth-enabled devices by sending a specially crafted Logical Link Control and Adaptation Protocol packet to a target device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Forms of Impersonation (2.2)

A

Impersonation
Brand Impersonation
Typosquatting
Watering Hole Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Brand Impersonation (2.2)

A

Specific form of impersonation where an attacker pretends to represent a legitimate company or brand

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Impersonation (2.2)

A

An attack where an adversary assumes the identity of another person to gain unauthorized access to resources or steal sensitive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Typosquatting (2.2)

A

A form of cyber attack where an attacker registers a domain name that is similar to a popular website but contains some kind of common typographical errors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Watering Hole Attacks (2.2)

A

Targeted form of cyber attack where attackers compromise a specific website or service that their target is known to use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Pretexting (2.2)

A

Technique where an attacker provides some information that seems true in an attempt to get the victim to provide more information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Phishing Attack Types (2.2)

A

Phishing
Vishing
Smishing
Whaling
Spear Phishing
Business Email Compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Phishing (2.2)

A

Fraudulent attack using deceptive emails from trusted sources to trick individuals into disclosing personal information like passwords and credit card numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Vishing (2.2)

A

Voice Phishing- Phone-based attack in which the attacker deceives victims into divulging personal or financial information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Smishing (2.2)

A

SMS Phishing- Attack that uses text messages to deceive individuals into sharing their personal information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Whaling (2.2)

A

Form of spear phishing that targets high-profile individuals, like CEOs or CFOs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Spear Phishing (2.2)

A

Phishing with a more tightly focused group of individuals or organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Business Email Compromise (BEC) (2.2)

A

Advanced phishing attack that leverages internal email accounts within a company to manipulate employees into carrying out malicious actions for the attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Identity Theft (2.2)

A

When attackers tries to fully assume the identity of their victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Identity Fraud (2.2)

A

e.g. Attacker takes the victims credit card number and makes charges

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Scam (2.2)

A

A fraudulent or deceptive act or operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Invoice Scam (2.2)

A

A scam in which a person is tricked into paying for a fake invoice for a service or product that they did not order

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Misinformation (2.2)

A

Inaccurate information shared unintentionally

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Disinformation (2.2)

A

Intentional spread of false information to deceive or mislead

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Attack Vector (2.4)

A

A means by which an attacker gains access to a computer to infect the system with malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Malware (2.4)

A

Malicious Software (Viruses, trojans, worms, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Virus (2.4)

A

Malicious code that’s run on a machine without the user’s knowledge
*requires user actions to reproduce and spread

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Virus Types (2.4)

A

Boot Sector
Macro
Program
Multipartite
Encrypted
Polymorphic
Metamorphic
Stealth
Armored
Hoax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Boot Sector Virus (2.4)

A

Stored in the first sector of a hard drive and loaded into memory upon boot up

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Macro Virus (2.4)

A

Allows virus to be embedded w/i another document (Word Doc, Spreadsheet, etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Program Virus (2.4)

A

Infect an executable or application file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Multipartite Virus (2.4)

A

Combination of a boot sector virus and program virus; first attaches itself to the boot sector and system files before attacking other files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Encrypted Virus (2.4)

A

Uses cipher to encrypt its contents in an attempt to hide from antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Polymorphic Virus (2.4)

A

Advanced version of an encrypted virus; changes itself every time it is executed by altering the decryption module in an attempt to hide from antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Metamorphic Virus (2.4)

A

Advanced version of Polymorphic Virus; is able to rewrite itself entirely before it attempts to infect a file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Stealth Virus (2.4)

A

A way viruses protect themselves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Armored Virus (2.4)

A

Has a layer of protection to confuse a program or person analyzing it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Hoax Virus (2.4)

A

Tricks user into infecting their own machine; ““Your machine has been infected”” messages; user gets the virus if they follow instructions; form of social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Worm (2.4)

A

Malicious software that is able to replicate and spread without any user interaction; cause disruption to normal network traffic and computing activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Trojan (2.4)

A

Malicious software which is disguised as harmless or desirable software; will usually provide desirable function as well as malicious one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

RAT (2.4)

A

Remote Access Trojan: trojan which gives attacker remote access to machine; most common type of trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Ransomware (2.4)

A

Encrypts users files and provides instructions for payment to decrypt files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Spyware (2.4)

A

Secretly gathers information about user w/o their consent; may include keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Adware (2.4)

A

Type of spyware which displays ads based on info collected while collecting data w/o consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Grayware (2.4)

A

Also known as Jokeware; Causes improper system behavior w/o serious consequences (eg crazymouse)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Botnet (2.4)

A

Network of compromised computers or devices controlled remotely by malicious actors; Allows attacker to use the devices processing power, memory etc. for nefarious purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Zombie (2.4)

A

A compromised computer or device that is part of a botnet and used to perform tasks using remote commands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Command and Control Node (2.4)

A

AKA C2 Node- Responsible for managing and coordinating the activities of other nodes or devices within a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Rootkit (2.4)

A

Designed to gain administrative level control on computer system w/o being detected; typically uses method called DLL Injection or Driver Manipulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

DLL Injection (2.4)

A

Malicious code is inserted into a running process on a Windows machine by taking advantage of Dynamic Link Libraries which are loaded at runtime

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Driver Manipulation (2.4)

A

Compromises the kernel-mode device drivers which operate at a privileged or system level

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Shim (2.4)

A

Code placed between two components to intercept calls and redirect them; similar concept as man in the middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Spam (2.4)

A

Abuse of electronic messaging systems; usually email, texts, etc.; usually just annoying but can be dangerous if malicious code is embedded in messages

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

CAN-SPAM Act of 2003 (2.4)

A

Controlling the Assault of Non-solicited Pornography And Marketing; 1st national standards for sending commercial emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Spim (2.4)

A

Spam over instant messaging; text messages, chat rooms, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Backdoor (2.4)

A

Used to bypass the normal security and authentication functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Easter Egg (2.4)

A

Unsecure coding practice that was used by programmers to provide a joke or a gag gift to the users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Logic Bomb (2.4)

A

Malicious code that’s inserted into a program and will only execute when certain conditions have been met

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Keylogger (2.4)

A

Piece of software or hardware that records every single keystroke that is made on a computer or mobile device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Fileless Malware (2.4)

A

Used to create a process in the system memory without relying on the local file system on the infected host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Dropper (2.4)

A

Initiates or runs other malware forms within a payload on an infected host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Downloader (2.4)

A

Retrieves additional tools post the initial infection facilitated by a dropper

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Shellcode (2.4)

A

Encompasses lightweight code meant to execute an exploit on a given target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Concealment (2.4)

A

Used to help the threat actor prolong unauthorized access to a system by hiding tracks, erasing log files, and hiding any evidence of malicious activities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Living of the Land (2.4)

A

A strategy adopted by many APTs and criminal organizations
The threat actors try to exploit the standard system tools to perform intrusions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Indications of Malware Attacks (2.4)

A

Account lockout
Concurrent session usage
Blocked content
Impossible travel
Resource consumption
Resource inaccessibility
Out-of-cycle logging
Missing logs
Published or documented attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Account lockout (2.4)

A

User’s unable to access accounts due to login attempts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Concurrent session usage (2.4)

A

User’s having multiple concurrent/simultaneous sessions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Blocked content (2.4)

A

Increase in blocked content notices from security tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

Impossible travel (2.4)

A

User’s account is accessed from two different geographic locations in an impossible amount of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Resource consumption (2.4)

A

System slowdowns for unidentified reasons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Resource inaccessibility (2.4)

A

Inability to access resources such as files or systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Out-of-cycle logging (2.4)

A

Log files generated at odd hours

87
Q

Missing logs (2.4)

A

Log files missing/deleted; time gap in logs

88
Q

Published or documented attacks (2.4)

A

If a report is published stating your organization has been attacked

89
Q

Common Sign of Phishing Attempt (2.2)

A

Generic greetings
Spelling and grammar mistakes
Spoofed email addresses
Urgency
Unusual requests
Mismatched URLs
Strange email addresses

90
Q

Cryptographic Attacks (2.4)

A

Techniques and strategies that adversaries employ to exploit vulnerabilities in cryptographic systems with the intent to compromise the confidentiality, integrity, or authenticity of data

91
Q

Downgrade Attack (2.4)

A

aka Version Rollback Attack- Cryptographic attack which aims to force a system into using a weaker or older cryptographic standard or protocol than what it’s currently utilizing

92
Q

Quantum Computing (2.3)

A

A computer that uses quantum mechanics to generate and manipulate quantum bits (qubits) in order to access enormous processing powers

93
Q

Collision Attack (2.4)

A

Aims to find two different inputs that produce the same hash output

94
Q

Quantum Communications (2.3)

A

A communications network that relies on qubits made of photons to send multiple combinations of ones and zeros simultaneously which results in tamper resistant and extremely fast communications

95
Q

Qubit (2.3)

A

A quantum bit composed of electrons or photons that can represent numerous combinations of ones and zeros at the same time through superposition

96
Q

Post-Quantum Cryptography (2.3)

A

A new kind of cryptographic algorithm that can be implemented using todays classical computers but is also impervious to attacks from future quantum computers

97
Q

Post-Quantum Cryptographic Algorithms (2.3)

A

CRYSTALS-Dilithium - Recommended by NIST for digital signatures
FALCON
SPHINCS+ - Focuses on hashing

98
Q

Brute Force Attacks (2.6)

A

Involves trying every possible combination of characters until the correct password is found
Mitigated against by:
Increasing complexity
Increasing length
Limiting number of login attempts
Using multifactor authentication
Using CAPTCHAS

99
Q

Dictionary Attack (2.6)

A

Using a list of commonly used passwords and trying them all
Mitigated against by:
Increasing complexity
Increasing length
Limiting number of login attempts
Using multifactor authentication
Using CAPTCHAS

100
Q

Password Spraying (2.6)

A

A form of brute force attack that involves trying a small number of commonly user passwords against a large number of usernames or accounts
Mitigated against by:
Using unique passwords
Using multifactor authentication

101
Q

Hybrid Attack (2.6)

A

Blends brute force and dictionary techniques by using common passwords with variations, such as adding numbers or special characters

102
Q

Hardware Vulnerabilities (2.3)

A

Security flaws or weaknesses inherent in a devices physical components or design that can be exploited to compromise the integrity, confidentiality, or availability of the system and its data

103
Q

Firmware (2.3)

A

Specialized form of software stored on hardware device, like a router or a smart thermostat, that provides low-level control for the devices specific hardware

104
Q

End-of-Life Systems (2.3)

A

Refers to hardware or software products that have reached the end of their life cycle; vendors no longer providing support

105
Q

Legacy Systems (2.3)

A

Outdated computing software, hardware, or technologies that have been largely superseded by newer and more efficient alternatives

106
Q

Unsupported Systems (2.3)

A

Hardware or software products that no longer receive official technical support, security updates, or patches from their respective vendors or developers

107
Q

Unpatched System (2.3)

A

Device, application, or piece of software that has not been updated with the latest security patches so that it remains vulnerable to known exploits and attacks

108
Q

Hardware Misconfiguration (2.3)

A

Occurs when a devices settings, parameters, or options are not optimally set up, and this can cause vulnerabilities to exist, a decrease in performance, or unintended behavior of devices or systems

109
Q

Hardening (2.3)

A

Involves tightening the security of a system

110
Q

Patching (2.3)

A

Involves the regular updating of the software, firmware, and applications with the latest security patches

111
Q

Decommissioning (2.3)

A

Means that the system is retired and removed from the network

112
Q

Isolation (2.3)

A

Used to limit the potential damage that might occur from a potential security breach

113
Q

Segmentation (2.3)

A

Used to divide the network into segments

114
Q

Configuration Enforcement (2.3)

A

Used to ensure that all devices and systems adhere to a standard secure configuration

115
Q

Bluetooth (2.3)

A

Wireless technology standard used for exchanging data between fixed and mobile devices over short distances without the need for an Internet connection

116
Q

Insecure Device Pairing (2.3)

A

Occurs when Bluetooth devices establish a connection without proper authentication

117
Q

Device Spoofing (2.3)

A

Occurs when an attacker impersonates a device to trick a user into connecting

118
Q

On-Path Attack (2.3)

A

Exploits Bluetooth protocol vulnerabilities to intercept and alter communications between devices without either party being aware

119
Q

Bluejacking (2.3)

A

Attacker sends unsolicited messages to a Bluetooth enabled device to test the vulnerability of the device

120
Q

Bluesnarfing (2.3)

A

Attacker obtains unauthorized access to a device using Bluetooth connection oftentimes to steal data such as contacts, call logs, and/or text messages

121
Q

Bluesmack (2.3)

A

Bluetooth attack which focuses on a denial of service by sending a large amount of data

122
Q

Blueborne (2.3)

A

An attack which is sent wirelessly and can affect numerous devices within seconds without requiring user intervention

123
Q

Bluetooth Attack Prevention (2.3)

A

Keep Bluetooth off when not in use
Ensure devices are set to non-discoverable
Regularly update firmware
Only allow pairing between known/trusted devices
Use unique PINs or passkeys
Be cautious of unsolicited connection requests
Use encryption for sensitive data transfers

124
Q

Sideloading (2.3)

A

The practice of installing applications on a device from unofficial sources which actually bypasses devices default app store

125
Q

Jailbreaking / Rooting (2.3)

A

Process that gives users escalated privileges on the devices and allows users to circumvent the built-in security measures provided by the devices

126
Q

MDM (2.3)

A

Mobile Device Management- used to conduct patching of the devices by pushing any necessary updates to the devices to ensure that they are always equipped with the latest security patches

127
Q

Zero-Day Vulnerability (2.3)

A

Any vulnerability that’s discovered or exploited before the vendor can issue a patch for it

128
Q

Zero-Day Exploit (2.3)

A

Any unknown exploit that exposes a previously unknown vulnerability in the software or hardware

129
Q

Data Exfiltration (2.3)

A

Unauthorized data transfers from within an organization to an external location

130
Q

Malicious Updates (2.3)

A

Occurs when an attacker has been able to craft a malicious update to a well-known and trusted program in order to compromise the systems of the programs end users

131
Q

Code Injection (2.3)

A

The insertion of code through a data input form from a client to an application

132
Q

SQL (2.3)

A

Structured Query Language- used to search, input, update, and delete data from a database

133
Q

XML (2.3)

A

Extensible Markup Language- Used by web applications for authentication, authorization, and other types of data exchange

134
Q

XML Bomb (2.3)

A

Billion Laughs Attack- XML encodes entities that expand to exponential sizes, consuming memory on the host and potentially crashing it

135
Q

XXE Attack (2.3)

A

XML External Entity- An attack that embeds a request for a local resource

136
Q

XSS (2.3)

A

Cross Site Scripting- Injects a malicious script into a trusted site to compromise the sites visitors

137
Q

Persistent XSS (2.3)

A

Persistent Cross Site Scripting- Allows an attacker to insert code into the backend database used by that trusted website

138
Q

DOM XSS (2.3)

A

Document Object Model Cross Site Scripting- Exploits the client-side scripts to modify the content and layout of the web page

139
Q

Session Management (2.3)

A

Enables web applications to uniquely identify a user across several different actions and requests

140
Q

Cookie (2.3)

A

Text file used to store information about a user when they visit a website

Non-Persistent: Known as a session cookie, which resides in memory and is used for a very short period of time; when session concludes cookie is deleted

Persistent: Store in the browser cache until either deleted by a user or expired

141
Q

Session Hijacking (2.3)

A

Type of spoofing attack where the attacker disconnects a host and then replaces it with his or her own machine by spoofing the original host IP

142
Q

Session Prediction Attacks (2.3)

A

Type of spoofing attack where the attacker attempts to predict the session token in order to hijack the session

143
Q

XSRF (2.3)

A

Cross-Site Request Forgery- Malicious script is used to exploit a session started on another site within the same web browser

144
Q

Buffer Overflow (2.3)

A

Occurs when data exceeds allocated memory, potentially enabling unauthorized access or code execution

145
Q

Buffer (2.3)

A

A temporary storage area where a program stores its data

146
Q

Race Condition (2.3)

A

Software vulnerability where the outcome depends on the timing of events not matching the developers intended order

Typically occur outside the normally logged processes on a computer making them difficult to detect

147
Q

Dereferencing (2.3)

A

Software vulnerability that occurs when the code attempts to remove the relationship between a pointer and the thing that pointer was pointing to in the memory

148
Q

Dirty Cow (2.3)

A

Popular 2016 exploit showcasing a race condition exploitation

149
Q

COW (2.3)

A

Copy On Write

150
Q

TOC (2.3)

A

Time Of Check- Type of race condition where an attacker can alter a system resource after an application checks its state but before the operation is performed

151
Q

TOU (2.3)

A

Time Of Use- Type of race condition that occurs when an attacker can change the state of a system resource between the time it is checked and the time it is used

152
Q

TOE (2.3)

A

Time Of Evaluation- Type of race condition that involves the manipulation of data or resources during the time window when a system is making a decision or evaluation

153
Q

Mutex (2.3)

A

Mutually exclusive flag that acts as a gatekeeper to a section of code so that only one thread can be processed at a time

154
Q

Deadlock (2.3)

A

Occurs when a lock remains in place because the process its waiting for is terminated, crashes, or doesn’t finish properly, despite the processing being complete

155
Q

Flood Attack (2.4)

A

Specialized type of DoS attack which attempts to send more packets to a single server or host

156
Q

Ping Flood (2.4)

A

A variety of flood attack in which a server is sent with too many pings (ping = ICMP echo but exam refers to it as a ping)

157
Q

SYN Flood (2.4)

A

A variety of a flood attack where an attacker will initiate multiple TCP sessions but never complete the three-way handshake

158
Q

PDoS (2.4)

A

Permanent Denial of Service- An attack whi9ch exploits a security flaw by re-flashing a firmware, permanently breaking the networking device

159
Q

Fork Bomb (2.4)

A

A large number of processes is created to use up a computers available processing power

160
Q

DNS Amplification Attack (2.4)

A

Specialized DDoS attack where the attacker overloads a target system with DNS response traffic by exploiting the DNS resolution process

161
Q

Blackhole / Sinkhole (2.4)

A

Method of fighting a DDoS attack by identifying attacking IP addresses and routing all their traffic to a non-existent server (this is a temporary solution since attackers can just change their IP address)

162
Q

Elastic Cloud Infrastructure (2.4)

A

Scales up as server requirements increase which can ride out a DDoS attack but costs money due to scaling up

163
Q

DNS (2.4)

A

Domain Name Systems- Responsible for translating human-friendly domain names into IP addresses that computers can understand

164
Q

DNS Cache Poisoning (2.4)

A

aka DNS Spoofing- Involves corrupting the DNS resolver with false information

165
Q

DNSSEC (2.4)

A

Domain Name System Security extensions- adds a digital signature to the organizations DNS data; combats DNS Cache Poisoning

166
Q

DNS Tunneling (2.4)

A

Uses DNS protocol over port 53 to encase non-DNS traffic, trying to evade firewall rules for commands control or data exfiltration

167
Q

Domain Hijacking (2.4)

A

Altering a domain names registration without the original registrants consent

168
Q

DNS Zone Transfer Attack (2.4)

A

The attacker mimics an authorized system to request an obtain the entire DNS zone data for a domain

169
Q

Directory Traversal (2.4)

A

A type of injection attack that allows access to commands, files, and directories, either connected to web document root directory or not (e.g. ../../../../)

170
Q

../ encoded is…

A

%2e%2e%2f (%2e = “.” ; %2f = “/”)

171
Q

File Inclusion (2.4)

A

Allows an attacker to either download files from an arbitrary location or upload an executable or script file to open a backdoor

172
Q

Remote File Inclusion (2.4)

A

Occurs when an attacker tries to execute a script to inject a remote file

173
Q

Local File Inclusion (2.4)

A

Occurs when an attacker tries to add a file that already exists

174
Q

Arbitrary Code Execution (2.4)

A

A vulnerability that allows an attacker to run a code or module that exploits a vulnerability

175
Q

Remote Code Execution (2.4)

A

A type of arbitrary code execution that allows an attacker to transmit code from a remote host

176
Q

Privilege Escalation (2.4)

A

Occurs when a user accesses or modifies specific resource that they are not entitles to normally access

Vertical Privilege Escalation- From normal level user to higher level (e.g. regular user to root)

Horizontal Privilege Escalation- From one user to another of generally the same level (e.g. from sales user to HR user)

177
Q

Rootkit (2.4)

A

A class of malware that modifies system files, often at the kernel level, to conceal its presence

Kernel Mode and User Mode

178
Q

Replay Attack (2.4)

A

Type of network-based attack that involves maliciously repeating or delaying valid data transmissions (e.g. attacker records banking login session and plays it back at a later time to log in as you)

179
Q

Session Hijacking (2.4)

A

A type of spoofing attack where the host is disconnected and replaced by the attacker; a lot of times this is done by stealing session cookies

180
Q

Session Tokens (2.4)

A

Unique data pieces that prevent session replay by attackers

181
Q

Session Management (2.4)

A

A fundamental security component that enables web applications to identify a user

182
Q

Session Prediction (2.4)

A

An attacker attempts to predict the session token to hijack that session

183
Q

Cookie Poisoning (2.4)

A

Modifying the contents of a cookie to be sent to a clients browser and exploit the vulnerabilities in an application

184
Q

On-Path Attack (2.4)

A

aka Interception Attack- An attack where the attacker puts the workstation logically between two hosts during the communication

185
Q

Relay Attack (2.4)

A

Occurs when attackers insert themselves in between two hosts and become part of the conversation

186
Q

SSL Stripping (2.4)

A

Tricking the encryption application with an HTTP connection instead of an HTTPS connection

187
Q

Downgrade Attack (2.4)

A

Occurs when an attacker attempts to have a client or server abandon its higher security mode

188
Q

LDAP Injection (2.4)

A

Lightweight Directory Access Protocol Injection- An attack in which LDAP statements, typically created by user input, are fabricated

189
Q

Command Injection (2.4)

A

A threat actor is able to execute arbitrary shell commands via a vulnerable web application

190
Q

Process Injection (2.4)

A

A method of executing arbitrary code in the address space of a separate live process

191
Q

IoC (2.4)

A

Indicators of Compromise- Data pieces that detect potential malicious activity on a network or system

Account lockouts (multiple failed login attempts)
Concurrent session usage (one user w/ multiple sessionts)
Blocked content (users attempting to download content w/o proper privileges)
Impossible travel (users logs on from US and an hour later from India)
Resource consumption
Resource inaccessibility (inablility to access resources such as a database)
Out-of-cycle logging (logs show entries during hours when office is closed)
Articles or documents on security breach sites
Missing logs

192
Q

Least Functionality (2.5)

A

A process of configuring a workstation or server with only essential applications and services for the user

193
Q

Allowlisting (2.5)

A

A security measure that permits only approved applications to run on an operating system; this is more secure than blocklisting since everything is denied by default but is more difficult to set up

194
Q

Blocklisting (2.5)

A

Entails preventing listed applications from running, allowing all others to execute; less secure than allowlisting but easier to set up

195
Q

Services (2.5)

A

Background applications that operate within the OS, executing a range of tasks; unnecessary services should be disabled

196
Q

Command Line syntax to stop service (Windows) (2.5)

A

sc stop [service name] (sc = service controls or…
net stop [service name]

197
Q

Command Line syntax to stop service (Mac/Linux) (2.5)

A

top (displays running processes with their associated pid’s
kill pid [process id of process to kill] (pid = process ID)

198
Q

TOS (2.5)

A

Trusted Operating System- Designed to provide a secure computing environment by enforcing stringent security policies that usually rely on mandatory access controls

199
Q

Integrity-178B (2.5)

A

POSIX-based operating system that is designed for embedded system use

200
Q

EAL (2.5)

A

Evaluation Assurance- Based on a set of predefined security standard and Certification from the Common Criteria for Information Technology Security Evaluation; has levels (1-7) e.g. Integrity-178B EAL level 6; highest level is 7

Most user based OS’s (Linux, Mac, Windows) are EAL level 4 or 4+ meaning they were carefully designed, tested and reviewed, and offer good security assurance

201
Q

MAC (reference TOS) (2.5)

A

Mandatory Access Control- Access permissions are determined by a policy defined by the system administrators and enforced by the operating system

202
Q

Trusted Solaris (2.5)

A

Offers secure, multi-level operations with MAC, detailed system audits, and data/process compartmentalization

203
Q

Hotfix (2.5)

A

A software patch that solves a security issue and should be applied immediately after being tested in a lab environment

204
Q

Update (2.5)

A

Provides a system with additional functionality but does not usually provide any patching of security related issues

205
Q

Service Pack (2.5)

A

Includes all the hotfixes and updates since the release of the operating system

206
Q

Effective Patch Management Program (2.5)

A
  1. Assign a dedicated team to track vendor security patches
  2. Establish automated system-wide patching for OS and applications
  3. Include cloud resources in the patch management
  4. Categorize patches as urgent, important, or non-critical for prioritization
  5. Create a test environment to verify critical patches before production deployment
  6. Maintain comprehensive patching logs for program evaluation and monitoring
  7. Establish a process for evaluating, testing, and deploying firmware updates
  8. Develop a technical process for deploying approved urgent patches to production
  9. Periodically assess non-critical patches for combined rollout
207
Q

Patch Management (2.5)

A

Planning, testing, implementing, and auditing of software patches

208
Q

Patch Management Steps (2.5)

A
  1. Planning- Create policies, procedures, and systems to track and very patch compatibility
  2. Testing
  3. Implementation
  4. Auditing
209
Q

Patch Management software (2.5)

A

Microsoft Endpoint Manager
Cisco UCS Manager

210
Q

Data Encryption (2.5)

A

Process of converting data into a secret code to prevent unauthorized access

211
Q

Types of Data Encryption (2.5)

A

Full Disk Encryption- Encrypts an entire hard disk (Bitlocker / FileVault)
Partition- Encrypts a specified partition (VeraCrypt)
File- Encrypts an individual file (GNU Privacy Guard aka GPG)
Volume- Encrypts a specified volume (VeraCrypt)
Database- Encrypts an entire database
Record- Encrypts specific record in a database

212
Q

GPG (2.5)

A

GNU Privacy Guard- Provides cryptographic privacy and authentication for data communication

213
Q

TDE (2.5)

A

SQL Server Transparent Data Encryption- Auto-encrypts the entire database without needing application changes, as the system handles encryption and decryption