Threats and Vulnerabilities Flashcards

1
Q

what is information security?

A

protects data and information from unathorized access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is information system security?

A

protects the systems that hold and process critical data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is CVE?

A

common vulnerabilites and exposures. a list of publicly disclosed computer security weaknesses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is an exploit?

A

software code that takes advantage of a security flaw or vulnerability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what is the CIA triad?

A

confidentiality, integrity and availabilty

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what does confidentiality relate to?

A

encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what does integrity relate to?

A

hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what does availabilty relate to?

A

redundancy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

what is a non compliant system?

A

system that is not on the baseline of what is approved by the organization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what is an unpatched system?

A

system without patches and updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is an unprotected system?

A

system not protected by any anti virus or firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what is End of Life (EOL)?

A

OS manufacturer stops providing security patches for any vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

what is a Zero Day Vulnerability?

A

vulnerability that is discovered or exploited before the vendor can issue a patch to fix it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

what is a Denial of Service (DoS) attack?

A

used to describe an attack that attempts to make a computer or servers resources unavailable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is a Flood Attack?

A

specialized type of DoS that attempts to send more packets to a server or host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is a Ping Flood?

A

happens when too many pings (ICMP echo) are being sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is a SYN flood?

A

attacker initiates multiple TCP sessions but never completes the three way handshake.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what is a permanent denial of service attack?

A

attack that exploits a security flaw to permanently break a networking device by reflashing its firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

what is a Fork Bomb?

A

attack that creates a large number of processes to use up the available processing power of a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

what is a distributed denial of service attack?

A

uses lots of machines to attack a server to create a DoS.

20
Q

what is DNS amplification attack?

A

allows an attacker to send packets to flood the victims website to initiate DNS requests.

21
Q

what is blackholing/sinkholing?

A

identifies attacking IP addresses and routes them to a non existent server through a null interface.

22
Q

what is spoofing?

A

occurs when an attacker masquerades as another person by falsifying their identity.

23
Q

what is IP spoofing?

A

modifies the source address of an IP packet to hide the identity of the sender or impersenate another client

24
Q

what is MAC spoofing?

A

changing the MAC address to pretend the use of a different network interface card or device

25
Q

what is ARP spoofing?

A

sending falsified ARP messages over a local area network.

26
Q

what is an on path attack?

A

occurs when an attacker puts themself between the victim and the intended destination

27
Q

what is a replay?

A

occurs when valid data is captured by the attacker and then repeated immediately, or delayed and then repeated.

28
Q

what is a relay?

A

occurs when the attacker inserts themself inbetween the two hosts.

28
Q

what is SSL stripping?

A

occurs when an attacker tricks the encryption application into presenting the user with an HTTP connection instead of an HTTPS connection.

29
Q

what is a downgrade attack?

A

occurs when an attacker attempts to have a server or client abandon a higher security mode in favor of a lower mode.

30
Q

what is an SQL injection?

A

attack consisting of the insertion or injection of an SQL query via input data from the client to a web application.

31
Q

what is an injection attack?

A

insertion of additional information or code through data input from a client to an application.

32
Q

how can you prevent an SQL injection?

A

input validation

33
Q

what is cross site scripting (xss)?

A

occurs when an attacker embeds malicious scripting commands on a trusted website.

34
Q

what are the three types of XSS attacks?

A

stored/persistent, reflected and DOM based

35
Q

what is a stored/persistent XSS attack?

A

attempts to get data provided by the attacker to be saved on the web server by the victim.

36
Q

what is a reflected XSS attack?

A

attempts to have a non persistent effect activated by a victim clicking a link on the site.

37
Q

what is a DOM based attack?

A

attempt to exploit the victims web browser

38
Q

how can you prevent XSS?

A

with output encoding and proper input validation.

39
Q

what is cross site request forgery? (XSRF/CSRF)

A

occurs when an attacker forces a user to to execute actions on a web server for which they are already authenticated

40
Q

how can programmers prevent XSRF?

A

with tokens, encryption, XML file scanning and cookie verification.

41
Q

what is the password analysis tool?

A

used to test the strength of passwords to ensure password policies are being followed.

42
Q

what is a password cracker?

A

uses comparative analysis to break passwords and systemically continues guessing until the password is determined.

43
Q

what are the two most known password crackers?

A

Cain and Abel and John the Ripper

44
Q

what is a dictionary attack?

A

method where a program attempts to guess the password by using a list of possible passwords.

45
Q

what is a brute force attack?

A

method where a program attempts to try every possible combination until it cracks the password.

46
Q

what is a cryptonaylsis attack?

A

comparing a precomputed encrypted password to a value in a lookup table.