Threat & Vulnerabilities Flashcards

1
Q

Person or event with the potential to have an impact on a valuable resource

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Flaw or weakness within a system that can be exploited. Quality within a resource or its environment that might allow a threat to be realized

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The likelihood of a threat exploiting a vulnerability

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Act of protecting data and information from unauthorized access, unlawful modification and disruption, disclosure, and corruption, and destruction

A

Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Threat that originates within the organization

A

Internal / Insider Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The act of protecting the systems that hold and process critical data, the device holding the data

A

Information System Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CIA Triad

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Threats that are external to an organization

A

External Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List of publicly disclosed computer security weaknesses

A

CVE (Common Vulnerabilities and Exposure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Vulnerability that is discovered or exploited before the vendor can issue a patch to fix it

A

Zero-day vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Software code that takes advantage of a security flaw or vulnerability

A

Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Confidentiality protections such as looked doors, fences, security guards, security cameras, and safes are examples of what type of protection?

A

Physical protections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Confidentiality protections such as encryption, passwords, firewalls, and MFA are examples of what type of protection?

A

Electronic protections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

2 best methods for integrity

A

1) Hashing
2) Checksums

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A file goes through a one way encryption algorithm that gives a unique digital fingerprint to the file

A

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Occurs when the data is modified during storage, at rest, or transit.

A

Failure of integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Having good backup strategies and disaster recovery plans ensure which one of the CIA triad?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

3 main things to remember when regarding CIA triad

A

Confidentiality – Encryption (like WPA2)
Integrity – Hashing (like MD5, SHA-1)
Accessibility – Redundancy & reliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

System that is not on the baseline of what is approved by the organization.
(Configuration baseline is a set of recommendations for deploying a computer in a hardened configuration)
System that is not compliant in the configuration baseline.

A

Non-compliant System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

5 main vulnerabilities to network and systems

A

1) Non-compliant systems
2) Unpatched systems
3) Unprotected systems
4) EOL (End-of-Life) OSs
5) BYOD (Bring your own device)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

An attack that attempts to make a computer or server’s resources unavailable

A

Denial of Service (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Specialized type of DoS attack that attempts to send more packets to a server or host

A

Flood attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Type of flood DoS attack that happens when too many pings (IMCP echo) are being sent

A

Ping Flood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Type of flood DoS attack where the attacker initiates multiple TCP sessions but never completes the three-way handshake

A

SYN Flood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

3 ways to prevent DoS attacks

A

1) Flood Guards
2) Time Outs
3) Intrusion Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Type of DoS attack that exploits a security flaw to permanently break a networking device by reflashing its firmware

A

Permanent Denial of Service (PDoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Attack that creates a large number of processes to use up the available processing power of a computer

A

Fork Bomb

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Uses lots of machines to attack a server to create a DoS

A

Distributed Denial of Service (DDoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Type of DDoS attack that allows an attacker to send packets to flood the victim’s website to initiate DNS requests

A

DNS Amplification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A way to prevent a DoS attack that identifies attacking IP addresses and routes them to a non-existent server through the null interface

A

Blackhole/Sinkhole

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A way to prevent a DoS attack that identifies and responds to small-scale DoS attacks

A

Intrusion Prevention

29
Q

A way to prevent a DDoS attack that scales up when demand increases

A

Elastic Cloud Infrastructure
(companies such as Cloudflare and Akamai)

30
Q

3 main spoofing attacks

A

1) IP spoofing
2) MAC spoofing
3) ARP spoofing

31
Q

Attack that occurs when an attacker masquerades as another person by falsifying their identity electronically

A

Spoofing

32
Q

Spoof that modifies the source address of an IP packet to hide the identity of the sender or impersonate another client

A

IP spoofing

33
Q

What layer of the OSI model is IP spoofing apart of?

A

Layer 3

34
Q

What layer of the OSI model is MAC spoofing apart of?

A

Layer 2

35
Q

Attacker changes the MAC address to pretend the use of a different network interface card or device

A

MAC spoofing

36
Q

Relies on a list of all known and authorized MAC addresses

A

MAC Filtering

37
Q

Command to spoof a MAC address

A

sudo ifconfig en0 ether <MAC></MAC>

38
Q

Type of spoof attack where the attacker sends falsified ARP messages over a local area network

A

ARP spoofing

39
Q

Occurs when an attacker puts themself between the victim and the intended destination

A

On-Path attack

40
Q

Ways to produce an On-Path attack

A

1) ARP poisoning
2) DNS poisoning
3) Introducing a rogue WAP (Wireless access point)
4) Introducing rogue hub/switch

41
Q

During an on-path attack happens, occurs when valid data is captured by the attacker and is then repeated immediately, or delayed, and the repeated

A

Replay

42
Q

During an on-path attack happens, occurs when the attacker inserts themself between the two hosts

A

Relay

43
Q

Occurs when an attacker tricks the encryption application into presenting the user with an HTTP connection instead of an HTTPS connection (to bypass secure encryption)

A

SSL Stripping

44
Q

Occurs when an attacker attempts to have a client or server abandon a higher security mode in favor of a lower security mode

A

Downgrade attack

45
Q

SQL stand for

A

Structured Query Language

46
Q

An attack consisting of the insertion or injection of an SQL query via input data from the client to a web application

A

SQL Injection

47
Q

Insertion of additional information or code through data input from a client to an application

A

Injection attack

48
Q

4 Common types of Injection attacks

A

1) SQL (most common)
2) HTML
3) XML
4) LDAP

49
Q

Example of SQL injection (returns value of True)

A

Typical:
username: Jason
password: pass123

SQL Injection
username: Jason
password: ‘OR 1=1;

50
Q

How can SQL injection be prevented? (2)

A

1) Input validation
2) Least privilege

51
Q

Attack occurs when an attacker embeds malicious scripting commands on a trusted website

A

Cross-Site Scripting (XSS)

52
Q

3 types of Cross-Site Scripting (XSS) attacks

A

1) Stored/Persistent
2) Reflected
3) DOM-based

53
Q

Type of XXS attack that attempts to get data provided by the attacker to be saved on the web server by the victim

A

Stored/Persistent

54
Q

Type of XXS attack that attempts to have a non-persistent effect activated by a victim clicking a link on the site

A

Reflected

55
Q

Type of XXS attack that attempts to exploit the victim’s web browser

A

Document Object Model (DOM)-based

56
Q

How to prevent XSS attacks? (2)

A

1) Output encoding
2) Proper input validation

57
Q

Attack that occurs when an attacker forces the user to execute actions on a web server for which they are already authenticated

A

Cross-Site Request Forgery (XSRF/CSRF)

58
Q

How to prevent XSRF? (4)

A

1) Tokens
2) Encryption
3) XML file scanning
4) Cookie verification

59
Q

Tool used to test the strength of passwords to ensure password policies are being followed properly

A

Password Analysis tool

60
Q

Uses comparative analysis to break passwords and systematically continues guessing until the password is determined

A

Password Cracker

61
Q

2 most well know password crackers

A

1) Cain & Abel
2) John the Ripper

62
Q

4 types of password cracking methods

A

1) Password Guessing
2) Dictionary Attack
3) Brute-force Attack
4) Cryptanalysis Attack

63
Q

Type of password cracking attack that occurs when a weak password is simply figured out by a person

A

Password Guessing

64
Q

Type of password cracking attack method where a program attempts to guess the password by using a list of possible passwords (lots common passwords)

A

Dictionary Attack

65
Q

Type of password cracking attack method where a program attempts to try every possible combination until it cracks the password (counts from 000 to 001 to 002)

A

Brute-Force attack

66
Q

Type of password cracking attack that compares a precomputed encrypted password to a value in a lookup table / rainbow table

A

Cryptanalysis Attack

67
Q

(No longer included in exam)
Type of password cracking attack that attempts to crack a password by threatening or causing a person physical harm in order to make them tell you the password

A

Rubber Hose Attack

68
Q

An employee or other trusted insider who uses their authorized network access in unauthorized ways to harm the company

A

Insider Threat

69
Q

A specific type of malware that is tied to either a logical event or a specific time (like entering a code every 24 hours)

A

Logic Bomb

70
Q

Which type of threat actor can accidentally or inadvertently cause a security incident in your organization?

a) Hacktivist
b) Insider threat
c) Organized Crime
d) APT (advanced persistent threats)

A

b) Insider threat

70
Q

Which of the following attacks would most likely be used to create an inadvertent disclosure of information from an organization’s database?

a) SQL injection
b) Cross-site scripting
c) Buffer overflow
d) Denial of Service

A

a) SQL injection

*SQL injection is a type of attack where malicious SQL code is inserted into a web application’s input fields, such as search boxes or login forms, in order to manipulate the database. If the application does not properly validate or sanitize user input, the attacker could exploit this vulnerability to: Retrieve unauthorized data from the database.
Expose sensitive information such as passwords, personal details, or other confidential records. Potentially modify or delete data, depending on the severity of the vulnerability. This attack directly targets the database and could lead to inadvertent disclosure of sensitive information, especially if the attacker successfully exploits the vulnerability to retrieve private or restricted data.

Why the other attacks are less likely for inadvertent disclosure:
b) Cross-site scripting (XSS): XSS attacks primarily target the users of a website, not the database. They allow attackers to inject malicious scripts into web pages viewed by other users, which could lead to the theft of cookies or session tokens, but not necessarily database information.

c) Buffer overflow: This attack generally targets vulnerabilities in a program’s memory and can lead to crashes or code execution on the system. While it can be dangerous, its primary goal is not to retrieve data from a database.

d) Denial of Service (DoS): A DoS attack seeks to make a system or service unavailable by overwhelming it with traffic or requests. It does not aim to extract or disclose information from a database but rather to disrupt services.*

70
Q

Tony works for a company as a cybersecurity analyst. His company runs a website that allows public postings. Recently, users have started complaining about the website having pop-up messages asking for their username and password. Simultaneously, your security team has noticed a large increase in the number of compromised user accounts on the system. What type of attack is most likely the cause of both of these events?

a) SQL injection
b) Rootkit
c) Cross-Site request forgery
d) Cross-Site scripting

A

d) Cross-Site scripting