Threats, Attacks, and Vulnerabilities (3) Flashcards
You are performing a penetration test of your company’s network. As part of the test, you will be given a login with minimal access and will attempt to gain administrative access with this account. What is this called?
Privilege escalation
Session hijacking
Root grabbing
Privilege escalation
The term for attempting to gain any privileges beyond what you have is privilege escalation
Mary has discovered that a web application used by her company does not always handle multithreading properly, particularly when multiple threads access the same variable. This could allow an attacker who discovered this vulnerability to exploit it and crash the server. What type of error has Mary discovered?
Buffer overflow
Logic bomb
Race conditions
Race conditions
This is a classic definition of a race condition: when multiple threads in an application are using the same variable and the situation is not properly handled
An attacker is trying to get access to your network. He is sending users on your network a link to a freeware stock-monitoring program. However, that stock-monitoring program has attached to it software that will give the attacker access to any machine that it is installed on. What type of attack is this?
Rootkit
Trojan horse
Spyware
Trojan horse
This is a classic example of a Trojan horse
Acme Company uses its own internal certificate server for all internal encryption. However, their certificate authority only publishes a CRL once per week. Does this pose a danger, and if so what?
Yes, this means a revoked certificate could be used for up to seven days.
No, this is standard for all certificate authorities.
Yes, this means it would be easy to fake a certificate.
Yes, this means a revoked certificate could be used for up to seven days.
If a certificate is revoked, it can be used until the new certificate revocation list is published
When a program has variables, especially arrays, and does not check the boundary values before inputting data, what attack is the program vulnerable to?
XSS
CRSF
Buffer overflow
Buffer overflow
A buffer overflow is possible when boundaries are not checked and the attacker tries to put in more data than the variable can hold
Which of the following best describes malware that will execute some malicious activity when a particular condition is met (i.e., if condition is met, then execute)?
Boot sector virus
Logic bomb
Buffer overflow
Logic bomb
This is the definition of a logic bomb
Gerald is a network administrator for Acme Company. Users are reporting odd behavior on their computers. He believes this may be due to malware, but the behavior is different on different computers. What might best explain this?
It is a boot sector virus.
It is a macro virus.
It is a polymorphic virus.
It is a polymorphic virus.
A polymorphic virus changes from time to time, and that would explain the different behavior on different computers
eresa is a security officer at ACME Inc. She has discovered an attack where the attacker sent multiple broadcast messages to the network routers, spoofing an IP address of one of the network servers. This caused the network to send a flood of packets to that server and it is no longer responding. What is this attack called?
Smurf attack
DDoS attack
TCP hijacking attack
Smurf attack
This is the definition of a Smurf attack
Which type of virus is able to alter its own code to avoid being detected by antivirus software?
Boot sector
Hoax
Polymorphic
Polymorphic
Polymorphic viruses periodically change their signature or even their code
Gerald is a network administrator for a small financial services company. Users are reporting odd behavior that appears to be caused by a virus on their machines. After isolating the machines that he believes are infected, Gerald analyzes them. He finds that all the infected machines received an email purporting to be from accounting, with an Excel spreadsheet, and the users opened the spreadsheet. What is the most likely issue on these machines?
A macro virus
A boot sector virus
A Trojan horse
A macro virus
This is the definition of a macro virus
Fred is on the incident response team for a major insurance company. His specialty is malware analysis. He is studying a file that is suspected of being a virus that infected the company network last month. The file seems to intermittently have bursts of malicious activity, interspersed with periods of being dormant. What best describes this malware?
A macro virus
A logic bomb
A sparse infector virus
A sparse infector virus
The intermittent burst of malicious activity is the definition of a sparse infector virus
What is the term used to describe a virus that can infect both program files and boot sectors?
Polymorphic
Multipartite
Stealth
Multipartite
Multipartite viruses combine boot sector with file infection
our company has hired an outside security firm to perform various tests of your network. During the vulnerability scan you will provide that company with logins for various systems (i.e., database server, application server, web server, etc.) to aid in their scan. What best describes this?
A white-box test
A privileged scan
An authenticated user scan
A privileged scan
By giving the tester logins, you are allowing him to conduct a privileged scan (i.e., a scan with some privileges)
Which of the following is commonly used in a distributed denial of service (DDoS) attack?
Phishing
Adware
Botnet
Botnet
Botnets are often used to launch DDoS attacks, with the attack coming from all the computers in the botnet simultaneously
You are investigating a recent breach at Acme Company. You discover that the attacker used an old account of someone no longer at the company. The account was still active. Which of the following best describes what caused this vulnerability to exist?
Improperly configured accounts
Untrained users
Using default configuration
Improperly configured accounts
Accounts should be configured to expire. If this had occurred, then the account would no longer be active