Threats Flashcards

1
Q

Define Elicitation.

A

the use of casual conversation to extract non-public information from people without giving them the feeling they are being interrogated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a watering hole attack?

A

a cyberattack targeting a particular organization, in which malware is installed on a website or websites regularly visited by the organization’s. members

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Define P-Cap.

A

A type of Trojan that enables unauthorized remote access to a compromised system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is an LDAP Injection attack?

A

An attack of LDAP (lightweight directory access protocol) that bypasses authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a race condition attack?

A

Also called Time of Check to Time of Use (or TOCTTOU attacks), Race condition attacks take advantage of the need that computing systems must execute some tasks in a specific sequence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Define SSRF.

A

Server-Side Request Forgery is a type of exploit which allows an attacker to take control over a server and use it as a proxy for unauthorized actions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Define CVSS.

A

Common Vulnerability Scoring System; an industry standard for assessing the severity of computer system security vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is OSINT?

A

Threat intelligence gathered from publicly available sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is IoC?

A

Indicators of Compromise is a type of forensic evidence that can be used to detect unauthorized access attempts or other malicious activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is AIS?

A

Automated Indicator Sharing ; a US government initiative for real-time sharing of cyber threat indicators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Define shimming.

A

Shimming is the practice of altering the external behavior of an application without introducing any changes to the application’s code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is bluesnarfing?

A

Bluesnarfing is the practice of gaining unauthorized access to a Bluetooth device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an OT attack?

A

An OT attack is a type of DDoS attack that targets industrial equipment and infrastructure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a wireless disassociation attack?

A

A type of denial-of-service (DoS), Deauthentication attack that forces a wireless client to disconnect from a wireless network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is ARP poisoning?

A

A type of attack in which an attacker sends falsified Address Resolution Protocol (ARP) messages to devices on a network. These messages cause the devices to incorrectly associate the attacker’s MAC address with the IP address of another device on the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define Layer 2 Attacks.

A

Layer 2 Attacks are attacks that target the data link layer of the Open Systems Interconnection (OSI) model.

17
Q

Name 4 types of Layer 2 Attacks.

A
  1. ARP Poisoning
  2. MAC Flooding
  3. VLAN Hopping
  4. Rogue access point
18
Q

What is an OT Attack?

A

An OT (Operational technology) attack is a DDoS attack that targets industrial equipment and infrastructure.

19
Q
A