threats attacks and vulnerabilities Flashcards
What type of attack can use a hidden password that has been in place since the
application was installed?
backdoor
What type of attack cannot be detected by a NIPS, NIDS, firewall, or a SIEM system, but
can only be detected by using baselines?
zero day
You have just started working at the reception desk of a multinational corporation.
During your induction period, one of the middle managers asks your coworker for some
information. You are not too sure if he is entitled to that information. The next day, when
your coworker has gone to lunch, the middle manager arrives asking you for the same
information, this time updated a little. You don’t want to be seen as different from other
employees, and so you give him the information. What type of attack has just been
launched?
social engineering consensus
The CEO has received an email asking him to click on a link and carry out an action so
that his salary information can be updated, as the company is moving to a new financial
system. What type of attack has just been launched?
whaling
Five seconds after connecting to the company’s wireless network, the sessions
drop. What type of wireless attack have I been the victim of?
wireless disassociation
A hacker has managed to gain access to my Bluetooth phone and has been texting all of
my friends, announcing that I am going to get married next year. This information is false.
What type of attack has just been carried out?
bluejacking
A hacker has managed to gain access to my Bluetooth phone and has been able to steal
my contact information. What type of attack has been carried out?
blue snarfing
What type of attack is an interception attack where the data has been replayed
immediately?
mitm
What type of attack is an interception attack where the data has been replayed at a later
date?
replay
two ways to prevent sql injection?
stored procedures and input validation
What type of attack interferes with my wireless network?
jamming
My domain controller uses NTLM authentication. What type of attack makes it
vulnerable?
pass the hash
how to prevent pass the hash?
kerberos and disable ntlm
What is the most difficult threat actor to detect and why?
insider already in your network and know about it
An attacker has managed to gain access to your corporate network through a host that
was not fully patched. Once he gained access to that host, he then launched an attack on
your SQL database server so that he could steal your customer’s credit card details. What
type of technique did the attacker adopt?
pivoting