Threats, Attacks, and Vulnerabilities 2 Flashcards
1
Q
- A __________ _________ attack is where an attacker gains the same level of authorization as the administrator.
A
- Privilege escalation
2
Q
- _____________ is wireless authentication that starts off by inserting a password, meaning that you only need to press a button to gain access to the wireless network.
A
- WPS
3
Q
- ___________ ___________ is where an attacker will ring up a help desk and ask them to reset the password for a user account.
A
- Active reconnaissance
4
Q
- A ___________ is where an attacker will ask you to look into the Windows\System32 folder to find an icon, such as a bear. If you find this icon, they will then ask you to delete the bear, as it is a virus. But when you do this, you will, in fact, delete a system file.
A
- Hoax
5
Q
- XSS targets _________, while remote exploits target ______ ______ .
A
- Servers, end users
6
Q
- Digital signatures are susceptible to a ___________ _______, a hash-collision attack.
A
- Birthday attack
7
Q
- A ________ attack is an interception attack where the data is forwarded at a later time and can be prevented by using Kerberos authentication that uses updated sequence numbers and timestamps.
A
- Replay
8
Q
- An auditor discovers that 50 new desktops have not been hardened properly, and puts it down to the fact that __________ ___________ had not been implemented early in the deployment.
A
- Security baseline
9
Q
- __________ and _________ are both used for driver manipulation.
A
- Shimming and refactoring
10
Q
- My airplane was delayed and my free time on the wireless captive portal expired. I can use ________ _______ to bypass the captive portal for another session of free wireless access.
A
- MAC spoofing
11
Q
- A ___‐_____________ vulnerability scan can find only missing patches.
A
- Non‐credentialed
12
Q
- A ____________ vulnerability scan has the ability to audit files and find account vulnerabilities.
A
- Credentialed
13
Q
- A CEO instructs the finance team to urgently send payment to ABC Limited just before he boards an aircraft on a transatlantic flight. This is an example of a social engineering ___________ and a __________ attack.
A
- Authority, urgency
14
Q
- An ______‐__________ vulnerability scan will not cause damage to the computer system.
A
- Non‐intrusive
15
Q
- ______ _______ ___________ is a wireless payment system that only works from close range.
A
- Near field communication
16
Q
- An HVAC system that is no longer supported by the manufacturer is known as _____ of __.
A
- End, life
17
Q
- A ______ ___________ is where a monitoring system tells me that an exploit has been found on the system, but when a manual inspection is done, nothing is found.
A
- False positive
18
Q
- A __________virus accesses a computer system by using a password that has been there since the installation of the application.
A
- Backdoor
19
Q
- ___________ _______________is where an attacker will visit a company’s website and social media websites to collect information about the company.
A
- Passive reconnaissance
20
Q
- A _________ _____ can be used to stop data-processing emissions being intercepted by a third party.
A
- Faraday cage
21
Q
- Changing the _________ _____________ and preventing IoT devices from directly accessing the _________ will help protect home networks from attacks.
A
- Default configuration, internet
22
Q
- When a system has come to the end of its life, the vendor will have a lack of _________ ____________.
A
- Vendor support
23
Q
- ________ ________ threat actors have a level of sophistication and provide advanced persistent threats.
A
- Nation State
24
Q
- ____________ __________ can cause your internet bandwidth to be reduced and your server disk space to decrease.
A
- Unauthorized software
25
25. _____ is the most insecure method of wireless security and should never be used, as it can be easily attacked.
25. WEP
26
26. __________ ________ threat actors are motivated by profits and may use blackmail.
26. Organized crime
27
27. ______ ________ ___________ can be sourced from publicly available intelligence sources.
27. Open source intelligence
28
28. ______ ____________ prevents SQL injection, buffer overflow, and integer overflow attacks.
28. Input validation
29
29. A company keeps the keys to all of the offices in the reception area and the workers sign the keys in and out each day. This is known as ____ ______________, and it prevents people from taking the keys home with them.
29. Key management
30
30. The policy of a company is to change the ________ ______________ of any new device that they purchase to ensure that it is more secure.
30. Default configurations
31
31. _____ _______ suites are where the key size is less than 1024 bits, and should be avoided.
31. Weak cipher
32
32. The Stuxnet virus is an example of a ___________ threat as it infected a computer system for about two years before it was discovered.
32. Persistent
33
33. _____‐______ is the strongest form of wireless security.
33. WPA2‐CCMP
34
34. _______ ___________ is what a pen tester will carry out first, based on the information they have.
34. Initial exploitation
35
35. A store had small devices stolen over the last three months. They rolled out _______ to prevent the small devices from leaving the store undetected.
35. RFID
36
36. Using SSL instead of TLS for data in transit could lead to a POODLE attack that is known as a ___________ attack.
36. Downgrade
37
37. To protect data in transit, you should use encryption where plaintext is changed to ___________.
37. Ciphertext
38
38. An attacker will try and log into your control panel to launch a ________
__________ attack.
38. Domain hijacking
39
39. A ___‐__‐____‐_______ attack is where a previously installed trojan intercepts your online banking transactions without changing the bank's URL.
39. Man‐in‐the‐browser
40
40. Both smurf attacks and DDoS attacks are known as _________ attacks.
40. Amplification
41
41. _______ ________ password attacks can detect every available combination of characters and can be stopped by using an account lockout or by salting the password using bcrypt or PBKDF2.
41. Brute Force
42
42. _____‐____ ________ ________attack is where a user is logged into a legitimate website and clicks on a link where an embedded program is located. This is also known as a one‐click attack, XRSF, or CSRF.
42. Cross-site reverse forgery
43
43. A __________ attack uses a legitimate website with links—for example, a Like button, a Share button, a free trial, or an Isn't This Funny? link.
43. Clickjacking
44
44. A ____ ___________ is where two threads access the same data at the same time and either cause the computer to crash or give an illegal operation error.
44. Race condition
45
45. _________ __________ is where an arithmetic calculation exceeds the maximum size an application can accept. It can be mitigated by using input validation.
45. Integer overflow
46
46. _________ prevents duplicate passwords from being stored and slows down brute-force attacks.
46. Salting
47
47. ____________ _______ on your network will not be patched and could be used for pivoting as they become vulnerable.
47. Undocumented assets
48
48. __________ _____ could inadvertently violate security policies and become vulnerable to a cybercrime or phishing attack.
48. Untrained users
49
49. __________ _______ is where proprietary code is tested by a consultant for security flaws.
49. Regression testing
50
50. ______ ______ of failure is where one person, device, or service could cause damage to the company's systems if it failed.
50. Single point