Threats, Attacks, and Vulnerabilities Flashcards
Q. What type of virus produces a different hash as it replicates through your network?
Polymorphic virus
Q. What type of attack can use a hidden password that has been in place since the application was installed?
A backdoor is put into an application by a programmer so that if the user locks themselves out, they can gain access to the application. A backdoor attack is where they use this password that has been in place since the application was created.
Q. What type of attack involves an agent attacking a high‐level executive calling them on a telephone and leaving a voicemail?
vishing
What type of attack involves a huge fireman arriving in the reception area of your company and you letting him into your server room?
Letting a fireman into your server room is a social engineering urgency attack; if you don’t let him in, your building could burn down.
What type of attack involves downloading a performance-enhancing computer program that says that I have 20,000 exploits and that I should purchase the full version of the product to remove them?
This is a disguised ransomware attack; you are parting with money to purchase the full version of the product
What type of attack collects passwords from your computer and sends them back to the hacker who then uses these passwords to gain access to your computer system?
A Remote Access Trojan (RAT) sends passwords to the hacker who then uses them to access your computer system.
What type of attack cannot be detected by a NIPS, NIDS, firewall, or a SIEM system, but can only be detected by using baselines?
A zero‐day virus can only be detected by using baselines. Day zero is when it is launched and it might take the vendor a few days to find a solution.
An employee leaves the company, then three months later, files are deleted from a file server, even though it has been isolated from the network. On investigation, it was found that the damage was caused by a script being launched. What type of attack was carried out?
A logic bomb
What type of attack is a stealth attack that tracks your internet habits and usage?
Spyware is a stealth attack that secretly tracks your internet usage and habits.
What type of attack uses multiple popups as its attack vector?
Adware uses pop ups as its attack vector.
What type of attack infects a well‐known, trusted website where the users do not suspect anything?
A watering hole attack infects a well‐known trusted website.
What type of attack is launched against a manager using email as its attack medium?
phishing
What type of attack is launched against managers using email as its attack medium?
spear phishing attack
A company is employing a third party to collect all of its shredded waste that will then be taken to a remote site and incinerated. What type of attack does this prevent?
Employing a third party to incinerate your paper waste prevents dumpster diving.
What type of attack is launched when you receive an email from the CEO threatening you with disciplinary action if you do not complete a form that was requested earlier by the human resources department (you don’t remember the earlier correspondence)?
Obtaining an email from the CEO or HR demanding you complete an attached form is a social engineering authority attack.
You have just started working at the reception desk of a multinational corporation. During your induction period, one of the middle managers asks your coworker for some information. You are not too sure if he is entitled to that information. The next day, when your coworker has gone to lunch, the middle manager arrives asking you for the same information, this time updated a little. You don’t want to be seen as different from other employees, and so you give him the information. What type of attack has just been launched?
Social engineering consensus is where you want to be accepted as part of a team, so you do what the team does.
The CEO has received an email asking him to click on a link and carry out an action so that his salary information can be updated, as the company is moving to a new financial system. What type of attack has just been launched?
This is whaling where the CEO clicks on a link.
What type of attack can be launched using HTML tags and/or JavaScript?
Cross-Site Scripting uses HTML tags and/or JavaScript.
When might an intrusive scan be used, and could it cause any damage to the system?
An intrusive scan is used during a penetration test and can cause considerable damage to your system.
Five seconds after connecting to the company’s wireless network, the sessions drop. What type of wireless attack have I been the victim of?
A wireless disassociation attack keeps disconnecting you from your wireless access point.
A hacker has managed to gain access to my Bluetooth phone and has been texting all of my friends, announcing that I am going to get married next year. This information is false. What type of attack has just been carried out?
Taking control and sending messages or texts is called Bluejacking; you are basically hijacking the phone.
A hacker has managed to gain access to my Bluetooth phone and has been able to steal my contact information. What type of attack has been carried out?
Stealing contacts from a Bluetooth phone is called bluesnarfing.
What type of attack is an interception attack where the data has been replayed immediately?
A man‐in‐the‐middle attack is an interception attack where the data is replayed immediately.
What type of attack is an interception attack where the data has been replayed at a later date?
A replay attack is an interception attack where the data is replayed at a later date.