Threats, Attacks, and Vulnerabilities 2 Flashcards

1
Q

A __________ _________ attack is where an attacker gains the same level of authorization as the administrator.

A

Privilege escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

___________ ___________ is where an attacker will ring up a help desk and ask them to reset the password for a user account.

A

Active reconnaissance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

XSS targets _________, while remote exploits target ______ ______ .

A

Servers, end users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

_____________ is wireless authentication that starts off by inserting a password, meaning that you only need to press a button to gain access to the wireless network.

A

WPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A ________ attack is an interception attack where the data is forwarded at a later time and can be prevented by using Kerberos authentication that uses updated sequence numbers and timestamps.

A

Replay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A ___________ is where an attacker will ask you to look into the Windows\System32 folder to find an icon, such as a bear. If you find this icon, they will then ask you to delete the bear, as it is a virus. But when you do this, you will, in fact, delete a system file.

A

HOAX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

My airplane was delayed and my free time on the wireless captive portal expired. I can use ________ _______ to bypass the captive portal for another session of free wireless access.

A

MAC spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Digital signatures are susceptible to a ___________ _______, a hash-collision attack.

A

Birthday attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

__________ and _________ are both used for driver manipulation.

A

Shimming and refactoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An auditor discovers that 50 new desktops have not been hardened properly, and puts it down to the fact that __________ ___________ had not been implemented early in the deployment.

A

Security baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

______ ______ of failure is where one person, device, or service could cause damage to the company’s systems if it failed.

A

Single point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

__________ _____ could inadvertently violate security policies and become vulnerable to a cybercrime or phishing attack.

A

Untrained users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

__________ _______ is where proprietary code is tested by a consultant for security flaws.

A

Regression testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

________ prevents duplicate passwords from being stored and slows down brute-force attacks.

A

Salting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_________ __________ is where an arithmetic calculation exceeds the maximum size an application can accept. It can be mitigated by using input validation.

A

Integer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

____________ _______ on your network will not be patched and could be used for pivoting as they become vulnerable.

A

Undocumented assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A __________ attack uses a legitimate website with links—for example, a Like button, a Share button, a free trial, or an Isn’t This Funny? link.

A

Clickjacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A ____ ___________ is where two threads access the same data at the same time and either cause the computer to crash or give an illegal operation error.

A

Race condition

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

_____‐____ ________ ________attack is where a user is logged into a legitimate website and clicks on a link where an embedded program is located. This is also known as a one‐click attack, XRSF, or CSRF.

A

Cross-site reverse forgery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

_______ ________ password attacks can detect every available combination of characters and can be stopped by using an account lockout or by salting the password using bcrypt or PBKDF2.

A

Brute Force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Both smurf attacks and DDoS attacks are known as _________ attacks.

A

Amplification

21
Q

Using SSL instead of TLS for data in transit could lead to a POODLE attack that is known as a ___________ attack.

A

Downgrade

22
Q

To protect data in transit, you should use encryption where plaintext is changed to ___________.

A

Ciphertext

23
Q

An attacker will try and log into your control panel to launch a ________
__________ attack.

A

Domain hijacking

24
Q

A store had small devices stolen over the last three months. They rolled out _______ to prevent the small devices from leaving the store undetected.

A

RFID

25
Q

A ___‐__‐____‐_______ attack is where a previously installed trojan intercepts your online banking transactions without changing the bank’s URL.

A

Man‐in‐the‐browser

26
Q

_______ ___________ is what a pen tester will carry out first, based on the information they have.

A

Initial exploitation

27
Q

_____‐______ is the strongest form of wireless security.

A

WPA2‐CCMP

28
Q

The Stuxnet virus is an example of a ___________ threat as it infected a computer system for about two years before it was discovered.

A

Persistent

29
Q

_____ _______ suites are where the key size is less than 1024 bits, and should be avoided.

A

Weak cipher

30
Q

A ___‐_____________ vulnerability scan can find only missing patches.

A

Non‐credentialed

31
Q

A ____________ vulnerability scan has the ability to audit files and find account vulnerabilities.

A

Credentialed

32
Q

A CEO instructs the finance team to urgently send payment to ABC Limited just before he boards an aircraft on a transatlantic flight. This is an example of a social engineering ___________ and a __________ attack.

A

Authority, urgency

33
Q

An ______‐__________ vulnerability scan will not cause damage to the computer system.

A

Non‐intrusive

34
Q

______ _______ ___________ is a wireless payment system that only works from close range.

A

Near field communication

35
Q

An HVAC system that is no longer supported by the manufacturer is known as _____ of __.

A

End, life

36
Q

A ______ ___________ is where a monitoring system tells me that an exploit has been found on the system, but when a manual inspection is done, nothing is found.

A

False positive

37
Q

A __________virus accesses a computer system by using a password that has been there since the installation of the application.

A

Backdoor

38
Q

___________ _______________is where an attacker will visit a company’s website and social media websites to collect information about the company.

A

Passive reconnaissance

39
Q

A _________ _____ can be used to stop data-processing emissions being intercepted by a third party.

A

Faraday cage

40
Q

Changing the _________ _____________ and preventing IoT devices from directly accessing the _________ will help protect home networks from attacks.

A

Default configuration, internet

41
Q

________ ________ threat actors have a level of sophistication and provide advanced persistent threats.

A

Nation State

42
Q

When a system has come to the end of its life, the vendor will have a lack of _________ ____________.

A

Vendor support

43
Q

_____ is the most insecure method of wireless security and should never be used, as it can be easily attacked.

A

WEP

44
Q

__________ ________ threat actors are motivated by profits and may use blackmail.

A

Organized crime

45
Q

______ ________ ___________ can be sourced from publicly available intelligence sources.

A

Open source intelligence

46
Q

______ ____________ prevents SQL injection, buffer overflow, and integer overflow attacks.

A

Input validation

47
Q

A company keeps the keys to all of the offices in the reception area and the workers sign the keys in and out each day. This is known as ____ ______________, and it prevents people from taking the keys home with them.

A

Key management

48
Q

The policy of a company is to change the ________ ______________ of any new device that they purchase to ensure that it is more secure.

A

Default configurations

49
Q

____________ __________ can cause your internet bandwidth to be reduced and your server disk space to decrease.

A

Unauthorized software