Threats, Attacks, and Vulnerabilities 2 Flashcards

1
Q
  1. A __________ _________ attack is where an attacker gains the same level of authorization as the administrator.
A
  1. Privilege escalation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. _____________ is wireless authentication that starts off by inserting a password, meaning that you only need to press a button to gain access to the wireless network.
A
  1. WPS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  1. ___________ ___________ is where an attacker will ring up a help desk and ask them to reset the password for a user account.
A
  1. Active reconnaissance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  1. A ___________ is where an attacker will ask you to look into the Windows\System32 folder to find an icon, such as a bear. If you find this icon, they will then ask you to delete the bear, as it is a virus. But when you do this, you will, in fact, delete a system file.
A
  1. Hoax
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. XSS targets _________, while remote exploits target ______ ______ .
A
  1. Servers, end users
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Digital signatures are susceptible to a ___________ _______, a hash-collision attack.
A
  1. Birthday attack
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  1. A ________ attack is an interception attack where the data is forwarded at a later time and can be prevented by using Kerberos authentication that uses updated sequence numbers and timestamps.
A
  1. Replay
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. An auditor discovers that 50 new desktops have not been hardened properly, and puts it down to the fact that __________ ___________ had not been implemented early in the deployment.
A
  1. Security baseline
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  1. __________ and _________ are both used for driver manipulation.
A
  1. Shimming and refactoring
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  1. My airplane was delayed and my free time on the wireless captive portal expired. I can use ________ _______ to bypass the captive portal for another session of free wireless access.
A
  1. MAC spoofing
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. A ___‐_____________ vulnerability scan can find only missing patches.
A
  1. Non‐credentialed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  1. A ____________ vulnerability scan has the ability to audit files and find account vulnerabilities.
A
  1. Credentialed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  1. A CEO instructs the finance team to urgently send payment to ABC Limited just before he boards an aircraft on a transatlantic flight. This is an example of a social engineering ___________ and a __________ attack.
A
  1. Authority, urgency
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. An ______‐__________ vulnerability scan will not cause damage to the computer system.
A
  1. Non‐intrusive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. ______ _______ ___________ is a wireless payment system that only works from close range.
A
  1. Near field communication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  1. An HVAC system that is no longer supported by the manufacturer is known as _____ of __.
A
  1. End, life
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  1. A ______ ___________ is where a monitoring system tells me that an exploit has been found on the system, but when a manual inspection is done, nothing is found.
A
  1. False positive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  1. A __________virus accesses a computer system by using a password that has been there since the installation of the application.
A
  1. Backdoor
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  1. ___________ _______________is where an attacker will visit a company’s website and social media websites to collect information about the company.
A
  1. Passive reconnaissance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  1. A _________ _____ can be used to stop data-processing emissions being intercepted by a third party.
A
  1. Faraday cage
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  1. Changing the _________ _____________ and preventing IoT devices from directly accessing the _________ will help protect home networks from attacks.
A
  1. Default configuration, internet
22
Q
  1. When a system has come to the end of its life, the vendor will have a lack of _________ ____________.
A
  1. Vendor support
23
Q
  1. ________ ________ threat actors have a level of sophistication and provide advanced persistent threats.
A
  1. Nation State
24
Q
  1. ____________ __________ can cause your internet bandwidth to be reduced and your server disk space to decrease.
A
  1. Unauthorized software
25
Q
  1. _____ is the most insecure method of wireless security and should never be used, as it can be easily attacked.
A
  1. WEP
26
Q
  1. __________ ________ threat actors are motivated by profits and may use blackmail.
A
  1. Organized crime
27
Q
  1. ______ ________ ___________ can be sourced from publicly available intelligence sources.
A
  1. Open source intelligence
28
Q
  1. ______ ____________ prevents SQL injection, buffer overflow, and integer overflow attacks.
A
  1. Input validation
29
Q
  1. A company keeps the keys to all of the offices in the reception area and the workers sign the keys in and out each day. This is known as ____ ______________, and it prevents people from taking the keys home with them.
A
  1. Key management
30
Q
  1. The policy of a company is to change the ________ ______________ of any new device that they purchase to ensure that it is more secure.
A
  1. Default configurations
31
Q
  1. _____ _______ suites are where the key size is less than 1024 bits, and should be avoided.
A
  1. Weak cipher
32
Q
  1. The Stuxnet virus is an example of a ___________ threat as it infected a computer system for about two years before it was discovered.
A
  1. Persistent
33
Q
  1. _____‐______ is the strongest form of wireless security.
A
  1. WPA2‐CCMP
34
Q
  1. _______ ___________ is what a pen tester will carry out first, based on the information they have.
A
  1. Initial exploitation
35
Q
  1. A store had small devices stolen over the last three months. They rolled out _______ to prevent the small devices from leaving the store undetected.
A
  1. RFID
36
Q
  1. Using SSL instead of TLS for data in transit could lead to a POODLE attack that is known as a ___________ attack.
A
  1. Downgrade
37
Q
  1. To protect data in transit, you should use encryption where plaintext is changed to ___________.
A
  1. Ciphertext
38
Q
  1. An attacker will try and log into your control panel to launch a ________
    __________ attack.
A
  1. Domain hijacking
39
Q
  1. A ___‐__‐____‐_______ attack is where a previously installed trojan intercepts your online banking transactions without changing the bank’s URL.
A
  1. Man‐in‐the‐browser
40
Q
  1. Both smurf attacks and DDoS attacks are known as _________ attacks.
A
  1. Amplification
41
Q
  1. _______ ________ password attacks can detect every available combination of characters and can be stopped by using an account lockout or by salting the password using bcrypt or PBKDF2.
A
  1. Brute Force
42
Q
  1. _____‐____ ________ ________attack is where a user is logged into a legitimate website and clicks on a link where an embedded program is located. This is also known as a one‐click attack, XRSF, or CSRF.
A
  1. Cross-site reverse forgery
43
Q
  1. A __________ attack uses a legitimate website with links—for example, a Like button, a Share button, a free trial, or an Isn’t This Funny? link.
A
  1. Clickjacking
44
Q
  1. A ____ ___________ is where two threads access the same data at the same time and either cause the computer to crash or give an illegal operation error.
A
  1. Race condition
45
Q
  1. _________ __________ is where an arithmetic calculation exceeds the maximum size an application can accept. It can be mitigated by using input validation.
A
  1. Integer overflow
46
Q
  1. _________ prevents duplicate passwords from being stored and slows down brute-force attacks.
A
  1. Salting
47
Q
  1. ____________ _______ on your network will not be patched and could be used for pivoting as they become vulnerable.
A
  1. Undocumented assets
48
Q
  1. __________ _____ could inadvertently violate security policies and become vulnerable to a cybercrime or phishing attack.
A
  1. Untrained users
49
Q
  1. __________ _______ is where proprietary code is tested by a consultant for security flaws.
A
  1. Regression testing
50
Q
  1. ______ ______ of failure is where one person, device, or service could cause damage to the company’s systems if it failed.
A
  1. Single point