Threats, Attacks, and Vulnerabilities 2 Flashcards
1
Q
- A __________ _________ attack is where an attacker gains the same level of authorization as the administrator.
A
- Privilege escalation
2
Q
- _____________ is wireless authentication that starts off by inserting a password, meaning that you only need to press a button to gain access to the wireless network.
A
- WPS
3
Q
- ___________ ___________ is where an attacker will ring up a help desk and ask them to reset the password for a user account.
A
- Active reconnaissance
4
Q
- A ___________ is where an attacker will ask you to look into the Windows\System32 folder to find an icon, such as a bear. If you find this icon, they will then ask you to delete the bear, as it is a virus. But when you do this, you will, in fact, delete a system file.
A
- Hoax
5
Q
- XSS targets _________, while remote exploits target ______ ______ .
A
- Servers, end users
6
Q
- Digital signatures are susceptible to a ___________ _______, a hash-collision attack.
A
- Birthday attack
7
Q
- A ________ attack is an interception attack where the data is forwarded at a later time and can be prevented by using Kerberos authentication that uses updated sequence numbers and timestamps.
A
- Replay
8
Q
- An auditor discovers that 50 new desktops have not been hardened properly, and puts it down to the fact that __________ ___________ had not been implemented early in the deployment.
A
- Security baseline
9
Q
- __________ and _________ are both used for driver manipulation.
A
- Shimming and refactoring
10
Q
- My airplane was delayed and my free time on the wireless captive portal expired. I can use ________ _______ to bypass the captive portal for another session of free wireless access.
A
- MAC spoofing
11
Q
- A ___‐_____________ vulnerability scan can find only missing patches.
A
- Non‐credentialed
12
Q
- A ____________ vulnerability scan has the ability to audit files and find account vulnerabilities.
A
- Credentialed
13
Q
- A CEO instructs the finance team to urgently send payment to ABC Limited just before he boards an aircraft on a transatlantic flight. This is an example of a social engineering ___________ and a __________ attack.
A
- Authority, urgency
14
Q
- An ______‐__________ vulnerability scan will not cause damage to the computer system.
A
- Non‐intrusive
15
Q
- ______ _______ ___________ is a wireless payment system that only works from close range.
A
- Near field communication
16
Q
- An HVAC system that is no longer supported by the manufacturer is known as _____ of __.
A
- End, life
17
Q
- A ______ ___________ is where a monitoring system tells me that an exploit has been found on the system, but when a manual inspection is done, nothing is found.
A
- False positive
18
Q
- A __________virus accesses a computer system by using a password that has been there since the installation of the application.
A
- Backdoor
19
Q
- ___________ _______________is where an attacker will visit a company’s website and social media websites to collect information about the company.
A
- Passive reconnaissance
20
Q
- A _________ _____ can be used to stop data-processing emissions being intercepted by a third party.
A
- Faraday cage
21
Q
- Changing the _________ _____________ and preventing IoT devices from directly accessing the _________ will help protect home networks from attacks.
A
- Default configuration, internet
22
Q
- When a system has come to the end of its life, the vendor will have a lack of _________ ____________.
A
- Vendor support
23
Q
- ________ ________ threat actors have a level of sophistication and provide advanced persistent threats.
A
- Nation State
24
Q
- ____________ __________ can cause your internet bandwidth to be reduced and your server disk space to decrease.
A
- Unauthorized software
25
Q
- _____ is the most insecure method of wireless security and should never be used, as it can be easily attacked.
A
- WEP
26
Q
- __________ ________ threat actors are motivated by profits and may use blackmail.
A
- Organized crime
27
Q
- ______ ________ ___________ can be sourced from publicly available intelligence sources.
A
- Open source intelligence
28
Q
- ______ ____________ prevents SQL injection, buffer overflow, and integer overflow attacks.
A
- Input validation
29
Q
- A company keeps the keys to all of the offices in the reception area and the workers sign the keys in and out each day. This is known as ____ ______________, and it prevents people from taking the keys home with them.
A
- Key management
30
Q
- The policy of a company is to change the ________ ______________ of any new device that they purchase to ensure that it is more secure.
A
- Default configurations
31
Q
- _____ _______ suites are where the key size is less than 1024 bits, and should be avoided.
A
- Weak cipher
32
Q
- The Stuxnet virus is an example of a ___________ threat as it infected a computer system for about two years before it was discovered.
A
- Persistent
33
Q
- _____‐______ is the strongest form of wireless security.
A
- WPA2‐CCMP
34
Q
- _______ ___________ is what a pen tester will carry out first, based on the information they have.
A
- Initial exploitation
35
Q
- A store had small devices stolen over the last three months. They rolled out _______ to prevent the small devices from leaving the store undetected.
A
- RFID
36
Q
- Using SSL instead of TLS for data in transit could lead to a POODLE attack that is known as a ___________ attack.
A
- Downgrade
37
Q
- To protect data in transit, you should use encryption where plaintext is changed to ___________.
A
- Ciphertext
38
Q
- An attacker will try and log into your control panel to launch a ________
__________ attack.
A
- Domain hijacking
39
Q
- A ___‐__‐____‐_______ attack is where a previously installed trojan intercepts your online banking transactions without changing the bank’s URL.
A
- Man‐in‐the‐browser
40
Q
- Both smurf attacks and DDoS attacks are known as _________ attacks.
A
- Amplification
41
Q
- _______ ________ password attacks can detect every available combination of characters and can be stopped by using an account lockout or by salting the password using bcrypt or PBKDF2.
A
- Brute Force
42
Q
- _____‐____ ________ ________attack is where a user is logged into a legitimate website and clicks on a link where an embedded program is located. This is also known as a one‐click attack, XRSF, or CSRF.
A
- Cross-site reverse forgery
43
Q
- A __________ attack uses a legitimate website with links—for example, a Like button, a Share button, a free trial, or an Isn’t This Funny? link.
A
- Clickjacking
44
Q
- A ____ ___________ is where two threads access the same data at the same time and either cause the computer to crash or give an illegal operation error.
A
- Race condition
45
Q
- _________ __________ is where an arithmetic calculation exceeds the maximum size an application can accept. It can be mitigated by using input validation.
A
- Integer overflow
46
Q
- _________ prevents duplicate passwords from being stored and slows down brute-force attacks.
A
- Salting
47
Q
- ____________ _______ on your network will not be patched and could be used for pivoting as they become vulnerable.
A
- Undocumented assets
48
Q
- __________ _____ could inadvertently violate security policies and become vulnerable to a cybercrime or phishing attack.
A
- Untrained users
49
Q
- __________ _______ is where proprietary code is tested by a consultant for security flaws.
A
- Regression testing
50
Q
- ______ ______ of failure is where one person, device, or service could cause damage to the company’s systems if it failed.
A
- Single point