Threats, Attacks, and Vulnerabilities Flashcards

1
Q

Address Resolution Protocol (ARP)

A

Protocol used to map known IP addresses to unknown physical addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Address Resolution Protocol (ARP) poisoning

A

An attack that convinces the network the attacker’s MAC address is the one associated with an allowed address, so the traffic is wrongly sent to the attacker’s address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

MAC (address)

A

Media Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

adware

A

Software that gathers information to pass on to marketers or that intercepts personal data and makes it available to third parties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

antivirus software

A

Software that identifies the presence of a virus and is capable of removing or quarantining the virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

armored virus

A

A virus that is protected in a way that makes disassembling it difficult

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ARP spoofing

A

similar to ARP poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

attack

A

Any unauthorized intrusion into the normal operations of a computer or network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

attack surface

A

The area of an application that is available to users – those who are authenticated and those who are not

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

attack surface reduction (ASR)

A

Minimizing the possibility of exploitation by reducing the amount of code and limiting potential damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ASR

A

attack surface reduction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

backdoor

A

An opening left in a program application that allows additional access to data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

bot

A

An automated software program that collects information on the web

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

buffer overflow

A

A type of denial of service (DoS) attack that occurs when more data is put into a bugger than it can hold

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

clickjacking

A

Using multiple transparent or opaque layers to trick a user into clicking a button on another page, when they had intended to click on the top page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

companion virus

A

A virus that creates a new program that runs in place of an expected program of the same name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

cross-site request forgery (XSRF)

A

A form of web-based attack in which unauthorized commands are sent from a user that a website trusts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

XSRF

A

cross-site request forgery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

cross-site scripting (XSS)

A

Running a script routine on a user’s machine from a website without their permission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

XSS

A

cross-site scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

denial-of-service (DoS)

A

A type of attack that prevents any users from using a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

DoS

A

denial-of-service (attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

dictionary attack

A

The act of attempting to crack passwords by testing them against a list of dictionary words

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

distributed denial-of-service (DDoS)

A

A derivative of a DoS attack in which multiple hosts in multiple locations all focus on one target to reduce its availability to the public

26
Q

DDoS

A

distributed denial-of-service

27
Q

DNS poisoning

A

An attack method in which a daemon caches DNS reply packets, which sometimes contain other information

28
Q

DNS spoofing

A

The DNS server is given information about a name server that it thinks is legitimate when it isn’t

29
Q

Domain Name System (DNS)

A

The network service used in TCP/IP networks that translates hostnames to IP addresses

30
Q

DNS

A

Domain Name System

31
Q

integer overflow

A

Putting too much information into too small of a space that has been set aside for numbers

32
Q

IP spoofing

A

Making the data look as if it came from a trusted host when it didn’t

33
Q

Principle of least privilege

A

A permission method in which users are granted only the privileges necessary to perform their job function

34
Q

logic bomb

A

Any code that is hidden and causes something unexpected to happen based on some criteria being met

35
Q

macro virus

A

A software exploitation virus that works by using the macro feature included in many applications

36
Q

malicious code

A

Any code that is meant to do harm

37
Q

Malicious insider threat

A

A threat from someone inside the organization intent on doing harm

38
Q

man-in-the-middle

A

An attack that occurs when someone/something that is trusted intercepts packets and retransmits them to another party

39
Q

multipartite virus

A

A virus that attacks a system in more than one way

40
Q

password attacks

A

Attempting to ascertain a password that you should not know

41
Q

phage virus

A

A virus that modifies and alters other programs and databases

42
Q

ping of death

A

A large Internet Control Message Protocol (ICMP) packet sent to overflow the remote host’s buffer

43
Q

polymorphic

A

An attribute of some viruses that allows them to mutate and appear differently each time they crop up

44
Q

privilege escalation

A

The result when a user obtains access to a resource that they wouldn’t normally be able to access

45
Q

ransomware

A

Software that demands payment before restoring the data or system infected

46
Q

replay attack

A

An attack that captures portions of a session to play back later to convince a host that it is still talking to the original connection

47
Q

retrovirus

A

A virus that attacks or bypasses the antivirus software installed on a computer

48
Q

rogueware

A

A form of malware that tries to convince the user to pay for a fake threat

49
Q

rootkit

A

Software program that has the ability to obtain root-level access and hide certain things from the operating system

50
Q

scareware

A

Software that tries to convince unsuspecting users that a threat exists

51
Q

shim

A

A small library that is created to intercept API calls transparently

52
Q

spoofing

A

An attempt by someone or something to masquerade as someone/something else

53
Q

spyware

A

Malware working on behalf of a third party to exfiltrate data

54
Q

stealth virus

A

A virus that attempts to avoid detection by masking itself from applications

55
Q

Trojan horse

A

Any application that masquerades as one thing in order to get past scrutiny and then does something malicious

56
Q

typo squatting

A

Creating domains that are based on the misspelling of another

57
Q

URL hijacking

A

Registering domains that are similar to those for a known entity but based on misspelling or typo error

i.e. whitehouse.com

58
Q

virus

A

A program intended to damage a computer system

59
Q

watering hole attack

A

Identifying a site that is visited by those whom they are targeting, poisoning that site, then waiting for the results

60
Q

Xmas attack

A

An advanced attack that tries to get around detection and send a packet with every single option enabled

61
Q

zero-day exploit

A

An attack that begins the very day an exploit is discovered

62
Q

zombie

A

Any system taking directions from a master control computer; a bot in a botnet