threats attacks and vulnerabilities Flashcards
What type of attack can use a hidden password that has been in place since the
application was installed?
backdoor
What type of attack cannot be detected by a NIPS, NIDS, firewall, or a SIEM system, but
can only be detected by using baselines?
zero day
You have just started working at the reception desk of a multinational corporation.
During your induction period, one of the middle managers asks your coworker for some
information. You are not too sure if he is entitled to that information. The next day, when
your coworker has gone to lunch, the middle manager arrives asking you for the same
information, this time updated a little. You don’t want to be seen as different from other
employees, and so you give him the information. What type of attack has just been
launched?
social engineering consensus
The CEO has received an email asking him to click on a link and carry out an action so
that his salary information can be updated, as the company is moving to a new financial
system. What type of attack has just been launched?
whaling
Five seconds after connecting to the company’s wireless network, the sessions
drop. What type of wireless attack have I been the victim of?
wireless disassociation
A hacker has managed to gain access to my Bluetooth phone and has been texting all of
my friends, announcing that I am going to get married next year. This information is false.
What type of attack has just been carried out?
bluejacking
A hacker has managed to gain access to my Bluetooth phone and has been able to steal
my contact information. What type of attack has been carried out?
blue snarfing
What type of attack is an interception attack where the data has been replayed
immediately?
mitm
What type of attack is an interception attack where the data has been replayed at a later
date?
replay
two ways to prevent sql injection?
stored procedures and input validation
What type of attack interferes with my wireless network?
jamming
My domain controller uses NTLM authentication. What type of attack makes it
vulnerable?
pass the hash
how to prevent pass the hash?
kerberos and disable ntlm
What is the most difficult threat actor to detect and why?
insider already in your network and know about it
An attacker has managed to gain access to your corporate network through a host that
was not fully patched. Once he gained access to that host, he then launched an attack on
your SQL database server so that he could steal your customer’s credit card details. What
type of technique did the attacker adopt?
pivoting
what is resource exchausition?
cpu being overloaded
What type of attack launches directed IP broadcasts to the border router where the
victim is overloaded with the resulting ping replies? What can you do to mitigate this
attack?
smurf attack
pharming attack
redirects users to malicous site
typo squatting
a hacker buys domains in similar name in case you mispell website name
session hijacking
attacker steals cookies from your computer system
what is a benefit of key stretching?
salting is a form and it prevents duplicate passwords
An attacker will try and log into your control panel to launch a ______ attack
domain hijacking
XSS targets _________, while remote exploits target ______ ______
Servers, end users
Digital signatures are susceptible to a ___________ _______, a hash-collision attack
birthday attack
A ________ attack is an interception attack where the data is forwarded at a later time
and can be prevented by using Kerberos authentication that uses updated sequence
numbers and timestamps
replay
A CEO instructs the finance team to urgently send payment to ABC Limited just before
he boards an aircraft on a transatlantic flight. This is an example of a social engineering
___________ and a __________ attack
authority and urgency
2 ways to secure IOT devices?
change default config and prevent them from directly accessing internet
input validation prevents what type of attacks?
SQL injection, buffer overflow, and integer overflow
attacks
company keeps the keys to all of the offices in the reception area and the workers sign
the keys in and out each day. This is known as ____ ______________, and it prevents people
from taking the keys home with them.
key management
what is a weak cipher suite?
where the key size is less than 1024 bits, and should be
avoided
SSL instead of TLS for data in transit could lead to a POODLE attack that is
known as a ___________ attack
downgrade
main in the browser
previously installed trojan intercepts your
online banking transactions without changing the bank’s URL
Cross-site reverse forgery
user is logged into a legitimate website
and clicks on a link where an embedded program is located.
Cross-site reverse forgery also known as what three items?
This is also known as a oneclick
attack, XRSF, or CSRF
regression testing
proprietary code is tested by a consultant for security
flaws
single point of failure
where one person, device, or service could cause damage to
the company’s systems if it failed