Threats, Attacks, and Vulnerabilities 2 Flashcards
1
Q
- A __________ _________ attack is where an attacker gains the same level of authorization as the administrator.
A
- Privilege escalation
2
Q
- _____________ is wireless authentication that starts off by inserting a password, meaning that you only need to press a button to gain access to the wireless network.
A
- WPS
3
Q
- ___________ ___________ is where an attacker will ring up a help desk and ask them to reset the password for a user account.
A
- Active reconnaissance
4
Q
- A ___________ is where an attacker will ask you to look into the Windows\System32 folder to find an icon, such as a bear. If you find this icon, they will then ask you to delete the bear, as it is a virus. But when you do this, you will, in fact, delete a system file.
A
- Hoax
5
Q
- XSS targets _________, while remote exploits target ______ ______ .
A
- Servers, end users
6
Q
- Digital signatures are susceptible to a ___________ _______, a hash-collision attack.
A
- Birthday attack
7
Q
- A ________ attack is an interception attack where the data is forwarded at a later time and can be prevented by using Kerberos authentication that uses updated sequence numbers and timestamps.
A
- Replay
8
Q
- An auditor discovers that 50 new desktops have not been hardened properly, and puts it down to the fact that __________ ___________ had not been implemented early in the deployment.
A
- Security baseline
9
Q
- __________ and _________ are both used for driver manipulation.
A
- Shimming and refactoring
10
Q
- My airplane was delayed and my free time on the wireless captive portal expired. I can use ________ _______ to bypass the captive portal for another session of free wireless access.
A
- MAC spoofing
11
Q
- A ___‐_____________ vulnerability scan can find only missing patches.
A
- Non‐credentialed
12
Q
- A ____________ vulnerability scan has the ability to audit files and find account vulnerabilities.
A
- Credentialed
13
Q
- A CEO instructs the finance team to urgently send payment to ABC Limited just before he boards an aircraft on a transatlantic flight. This is an example of a social engineering ___________ and a __________ attack.
A
- Authority, urgency
14
Q
- An ______‐__________ vulnerability scan will not cause damage to the computer system.
A
- Non‐intrusive
15
Q
- ______ _______ ___________ is a wireless payment system that only works from close range.
A
- Near field communication
16
Q
- An HVAC system that is no longer supported by the manufacturer is known as _____ of __.
A
- End, life
17
Q
- A ______ ___________ is where a monitoring system tells me that an exploit has been found on the system, but when a manual inspection is done, nothing is found.
A
- False positive
18
Q
- A __________virus accesses a computer system by using a password that has been there since the installation of the application.
A
- Backdoor
19
Q
- ___________ _______________is where an attacker will visit a company’s website and social media websites to collect information about the company.
A
- Passive reconnaissance
20
Q
- A _________ _____ can be used to stop data-processing emissions being intercepted by a third party.
A
- Faraday cage