Threats, Attacks, and Vulnerabilities (2) Flashcards
When phishing attacks are so focused that they target a specific individual, they are called what?
Spear phishing
Phishing
Whaling
Whaling
Whaling is targeting a specific individual
You are concerned about a wide range of attacks that could affect your company’s web server. You have recently read about an attack wherein the attacker sends more data to the target than the target is expecting. If done properly, this could cause the target to crash. What would best prevent this type of attack?
An SPI firewall
An active IDS/IPS
Checking buffer boundaries
Checking buffer boundaries
You are concerned about buffer overflows, and thus checking buffer boundaries is the best defense
You work for a large retail company that processes credit card purchases. You have been asked to test your company network for security issues. The specific test you are conducting involves primarily checking policies, documentation, and past incident reports. Which of the following best describes this type of test?
Vulnerability scan
Penetration test
Security audit
Security audit
Security audits typically focus on checking policies, documents, and so forth
Maria is a salesperson with your company. After a recent sales trip, she discovers that many of her logins have been compromised. You carefully scan her laptop and cannot find any sign of any malware. You do notice that she had recently connected to a public WiFi at a coffee shop, and it is only since that connection that she noticed her logins had been compromised. What would most likely explain what has occurred?
She connected to a rogue AP.
She downloaded spyware.
She is the victim of a buffer overflow attack.
She connected to a rogue AP.
Although many things could explain what she is experiencing, the scenario most closely matches connecting to a rogue access point where her login credentials were stolen
You are the manager for network operations at your company. One of the accountants sees you in the hall and thanks you for your team keeping his antivirus software up to date. When you ask him what he means, he mentions that one of your staff, named Mike, called him and remotely connected to update the antivirus. You don’t have an employee named Mike. What has occurred?
IP spoofing
Man-in-the-middle attack
Social engineering
Social engineering
This is a classic example of an attacker using social engineering on the accountant, in order to gain access to his system
You are a security administrator for a bank. You are very interested in detecting any breaches or even attempted breaches of your network, including those from internal personnel. But you don’t want false positives to disrupt work. Which of the following devices would be the best choice in this scenario?
IPS
WAF
IDS
IDS
An intrusion detection system will simply report issues, and not block the traffic
One of your users cannot recall the password for their laptop. You want to recover that password for them. You intend to use a tool/technique that is popular with hackers, and it consists of searching tables of precomputed hashes to recover the password. What best describes this?
Rainbow table
Backdoor
Social engineering
Rainbow table
A rainbow table is a table of precomputed hashes, used to retrieve passwords
You have noticed that when in a crowded area, you sometimes get a stream of unwanted text messages. The messages end when you leave the area. What describes this attack?
Bluejacking
Bluesnarfing
Evil twin
Bluejacking
Bluejacking involves sending unsolicited messages to Bluetooth devices when they are in range
Someone has been rummaging through your company’s trash bins seeking to find documents, diagrams, or other sensitive information that has been thrown out. What is this called?
Dumpster diving
Trash diving
Social engineering
Dumpster diving
This is the term for rummaging through the waste/trash
You have noticed that when in a crowded area, data from your cell phone is stolen. Later investigation shows a Bluetooth connection to your phone, one that you cannot explain. What describes this attack?
Bluejacking
Bluesnarfing
Evil twin
Bluesnarfing
Bluesnarfing involves accessing data from a Bluetooth device when it is in range
Louis is investigating a malware incident on one of the computers on his network. He has discovered unknown software that seems to be opening a port, allowing someone to remotely connect to the computer. This software seems to have been installed at the same time as a small shareware application. Which of the following best describes this malware?
RAT
Backdoor
Logic bomb
RAT
This is a remote-access Trojan (RAT), malware that opens access for someone to remotely access the system
This is a common security issue that is extremely hard to control in large environments. It occurs when a user has more computer rights, permissions, and privileges than what is required for the tasks the user needs to perform. What best describes this scenario?
Excessive rights
Excessive permissions
Excessive privileges
Excessive privileges
The term used in the industry is excessive privileges, and it is the opposite of good security practice, which states that each user should have least privileges (i.e., just enough privileges to do his or her job)
Jared is responsible for network security at his company. He has discovered behavior on one computer that certainly appears to be a virus. He has even identified a file he thinks might be the virus. However, using three separate antivirus programs, he finds that none can detect the file. Which of the following is most likely to be occurring?
The computer has a RAT.
The computer has a zero-day exploit.
The computer has a logic bomb.
The computer has a zero-day exploit.
zero-day exploits are new, and they are not in the virus definitions for the antivirus programs. This makes them difficult to detect, except by their behavior
There are some computers on your network that use Windows XP. They have to stay on Windows XP due to a specific application they are running. That application won’t run on newer operating systems. What security concerns does this situation give you?
No special concerns; this is normal.
The machines cannot be patched; XP is no longer supported.
The machines cannot coordinate with an SIEM since XP won’t support that.
The machines cannot be patched; XP is no longer supported.
When using products the vendor no longer supports, also known as end-of-life, one major concern is that there won’t be patches available for any issues or vulnerabilities
Farès has discovered that attackers have breached his wireless network. They seem to have used a brute-force attack on the WiFi-protected setup PIN to exploit the WAP and recover the WPA2 password. What is this attack called?
Evil twin
Rogue WAP
WPS Attack
WPS Attack
WiFi protected setup (WPS) uses a PIN to connect to the wireless access point (WAP). The WPS attack attempts to intercept that PIN in transmission, connect to the WAP, and then steal the WPA2 password