Threats, Attacks, and Vulnerabilities (4) Flashcards
Farès is the CISO of a bank. He has received an email that is encouraging him to click on a link and fill out a survey. Being security conscious, he normally does not click on links. However, this email calls him by name and claims to be a follow-up to a recent conference he attended. Which of the following best describes this attack?
Clickjacking
Spear phishing
Whaling
Whaling
This is a classic example of whaling, phishing that targets a specific individual
You are responsible for technical support at your company. Users are all complaining of very slow Internet connectivity. When you examine the firewall, you find a large number of incoming connections that are not completed, all packets coming from a single IP address. What best describes this attack?
DDoS
SYN flood
Buffer overflow
SYN flood
Large, half-open connections are the hallmark of a SYN flood
An attacker is trying to get malformed queries sent to the backend database to circumvent the web page’s security. What type of attack depends on the attacker entering text into text boxes on a web page that is not normal text, but rather odd-looking commands that are designed to be inserted into database queries?
SQL injection
Clickjacking
Cross-site scripting
SQL injection
SQL injection places malformed SQL into text boxes
Tyrell is responsible for selecting cryptographic products for his company. The company wants to encrypt the drives of all laptops. The product they have selected uses 128-bit AES encryption for full disk encryption, and users select a password to decrypt the drive. What, if any, would be the major weakness in this system?
None; this is a good system.
The 128-bit AES key is too short.
The passwords users select are the weak link.
The passwords users select are the weak link.
The user-selected password is always a weak link in hard drive encryption
Valerie is responsible for security testing applications in her company. She has discovered that a web application, under certain conditions, can generate a memory leak. What, type of attack would this leave the application vulnerable to?
DoS
Backdoor
SQL injection
DoS
If an attacker can induce the web application to generate the memory leak, then eventually the web application will consume all memory on the web server and the web server will freeze up
When a multithreaded application does not properly handle various threads accessing a common value, what flaw is this?
Memory leak
Integer overflow
Race condition
Race condition
This is the definition of a race condition
Acme Company is using smart cards that use near-field communication (NFC) rather than needing to be swiped. This is meant to make physical access to secure areas more secure. What vulnerability might this also create?
Tailgating
Eavesdropping
IP spoofing
Eavesdropping
Near-field communication (NFC) is susceptible to an attacker eavesdropping on the signal
John is responsible for physical security at a large manufacturing plant. Employees all use a smart card in order to open the front door and enter the facility. Which of the following is a common way attackers would circumvent this system?
Phishing
Tailgating
Spoofing the smart card
Tailgating
Tailgating involves simply following a legitimate user through the door once he or she has opened it
Which of the following is the term for an attack wherein malware inserts itself as a library, such as a DLL, between an application and the real system library the application is attempting to communicate with?
Jamming
Evil twin
Shimming
Shimming
This is the definition of shimming
You are responsible for incident response at Acme Corporation. You have discovered that someone has been able to circumvent the Windows authentication process for a specific network application. It appears that the attacker took the stored hash of the password and sent it directly to the backend authentication service, bypassing the application. What type of attack is this?
Hash spoofing
Shimming
Pass the hash
Pass the hash
This scenario is the definition of passing the hash
A user in your company reports that she received a call from someone claiming to be from the company technical support team. The caller stated that there was a virus spreading through the company and he needed immediate access to the employee’s computer to stop it from being infected. What social-engineering principles did the caller use to try to trick the employee?
Urgency and intimidation
Urgency and authority
Authority and trust
Urgency and authority
Claiming to be from tech support is claiming authority, and the story the caller gave indicates urgency
Ahmed has discovered that someone has manipulated tables in one of the company’s switches. The manipulation has changed the tables so that data destined for one specific MAC address will now be routed elsewhere. What type of attack is this?
ARP poisoning
DNS poisoning
Man-in-the-middle
ARP poisoning
This is the definition of ARP poisoning
You are investigating incidents at Acme Corporation and have discovered malware on several machines. It appears that this malware infects system files in the Windows/System32/ directory and also affects the boot sector. What type of malware is this?
Multipartite
Boot sector
Macro virus
Multipartite
This is a classic multipartite virus. It infects the boot sector, as well as an operating system file
What type of attack uses Bluetooth to access the data from a cell phone when in range?
Phonejacking
Bluejacking
Bluesnarfing
Bluesnarfing
Bluesnarfing accesses data on the cell phone
An attacker is using a table of precomputed hashes in order to try to get a Windows password. What type of technique is being used?
Dictionary
Brute force
Rainbow table
Rainbow table
A rainbow table is a table of precomputed hashes