Threats, Attacks, and Vulnerabilities Flashcards
What is the difference between intrusive versus non-intrusive vulnerability scans?
Non-intrusive identifies active OSs, applications, and ports by scanning system attributes, which intrusive actually probes devices and examines their responses.
Which type of attack involves flooding a recipient e-mail address with identical e-mails?
Spamming attack
What type of attack sequentially generates every possible password and checks them all against a password file
Brute force attack
Which type of attack allows an attacker to redirect Internet traffic by setting up a fake DNS server to answer client requsts?
DNS spoofing
What is spear phishing?
Phishing attempt that appears to come from a trusted person
What is a replay attack?
An attack where an intruder records the communication between a user and a server, and plays the recorded information back to impersonate the user
What does the acronym XSRF denote>
Cross-Site Request Forgery
What category of threat actor is most likely to have high funding and a high level of sophistication?
State actors or APTs (Advanced Persistent Threats)
What occurs during grey-box testing?
Security professionals with limited inside knowledge of the network attempted to hack into the network
What social engineering principle is being used when limited availability is used as a technique
Scarcity
What is bluesnarfing?
The act of gaining unauthorized access to a device (and the network it is connected to) through its Bluetooth connection
What is a flaw, loophole, or weakness in the system, software, or hardware?
Vulnerability
What viruses are written in a macro language and typically infect operating systems?
Macro viruses
What is phishing
When a request for confidential information that appears to originate from a seemingly trusted entity is recieved
What self-replicating computer program sends copies of itself to other devices on the network?
Worm
What is the most likely cause of a single computer communicating with an unknown IRC server and scanning other systems on the network
The computer is infected with a botnet
What is pharming
Traffic redirection to a website that looks identical to the intended website
What type of attack embeds an intruder to capture and modify data traffic by rerouting the traffic from a network device to the intruder’s computer
Network address hijacking
What category of vulnerability includes injection, cross-site scripting, and cross-site request forgery
Improper input handling
What is a trojan horse?
Malware that is disguised as a useful utility, but is embedded with a malicious code to infect computer systems
What is Nessus?
Network vulnerability scanner
What is an evil twin?
An access point with the same SSID as the legitimate access point
What does the acronym XSS denote?
Cross site scripting
What is an integer overflow
When an application or OS tries to place into computer memory an integer that is too large for the data type
What is a zero-day exploit
An attack that exploits a security vulnerability on the day the vulnerability becomes generally known
Which virus creates many variants by modifying its code to decieve antivirus scanners
Polymorphic virus
Which malicious software infects a system without relying upon other applications for its executing
Worm
What is the term for a potential opening in network security that a hacker can exploit to attack a network
Vulnerability
Which type of attack intercepts an established TCP session?
- TCP hijacking
* Session hijacking
Which type of attack does Challenge Handshake Authentication Protocol (CHAP) protect against?
Replay
What is meant by the term data exfiltration
The unauthorized transfer of data from a computer or device
Which error condition arises because data is not checked before input to ensure that it has an appropriate length?
Buffer overflow errors
Which type of attack runs code within another process’s address space by making it a dynamic link library
DLL injection attack
Which attack is an extension of the denial-of-service (DoS) attack and uses multiple computers
A distributed denial of service attack (DDoS)
Which type of brute-force attack attempts to find any two hashed passwords or messages that have the same value
Birthday attack
What type of virus can change its signature to avoid detection
Polymorphic virus
What is the difference between credentialed and non credentialed vulnerability scans
- Credentialed vulnerability scans use authentication to simulate an administrator or use on the system
- Non credentialed vulnerability scans do not authenticate
Which type of attack is characterized by an attacker who takes over the session of an already authenticated user?
Hijacking