Threats and Vulnerabilities Flashcards

1
Q

CIA triad

A

Confidentiality / integrity / availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality

A

Encryption
WPA2 WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Integrity

A

Hashing
Hash MD5 SHA1 SHA256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability

A

Redundancy reliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CVE

A

Common vulnerabilities and exposures
Known vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Zero day

A

Unknown vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

5 vulnerability types

A

Non-compliant systems
Unpatched
Unprotected
EOL-OS
BYOD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

3 DOS types

A

Flood attack - ping flood / SYN flood
Permanent DOS - forceful reflashing
Fork bomb - fills up a processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DDOS type uses zombies or bots

A

DNS amplification - flood a website with DNS requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

3 Spoofing types (faking identity)

A

Ip spoofing - faking ip address (layer 3)
Mac spoofing - (layer 2)
ARP spoofing - arp request to pair ip+mac

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

4 on path attacks
(When a attacker puts themselves in the middle)

A

ARP poisoning
DNS poisoning
Rouge WAP
Rouge Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SSL stripping

A

Turns HTTPS into HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Downgrade attack

A

Lowers the encryption version

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SQL injection

A

Structured Query Language

Insert SQL info into input data on a web application

Example replace password with ‘or 1=1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

XSS

A

Cross site scripting
Embeds script into website to effect the USER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

XSRF

A

Cross Site Request Forgery
Forces authenticated user to effect the SERVER

17
Q

4 Password Cracker types

A

Password guessing
Dictionary attack
Brute force attack
Cryptanalysis attack (compared hashes to a lookup table called a rainbow table)

18
Q
  1. Symptoms of infection with malware
A

Hard drive, files, or apps aren’t accessible
Strange noises
Unusual error messages
Display looks strange
Jumbled printouts
Double file extensions
New files or missing files
System restore won’t function

19
Q

Sign of infection and how to counter

A

Computer is acting funny or strange
Boot into safe mode
Or boot from external and scan with antivirus

20
Q

Phishing

A

Social engineering attack from supposedly reputable source trying to get victim to divulge information

21
Q

Spear phishing

A

Targeted small group phishing

22
Q

Whaling

A

Phishing fixed on executives

23
Q

Smishing

A

Sms phishing (texting)

24
Q

Vishing

A

Voice phishing

25
BEC
Business email compromise Taking over a executives email
26
Pharming
Tricks user into imputing info by redirecting to a website controlled by attacker
27
Elicitation
Ask people questing to get information or do something
28
Pretexing
Giving some kind of know or assumed info to get someone to share more
29
Social engineering
Hacking people
30
Tailgating
Following an authorized person into a secure area
31
Piggybacking
Tailgating with employees knowledge or consent
32
Shoulder surfing
Looking over someone’s shoulder
33
Evil twin
A fraudulent WAP
34
Karma attack
Finds devices looking for WAPs they’ve previously connected to and matches the SSID they’re looking for
35
Captive portal
Web page you’re obligated to visit prior to access being granted