threats attacks and vulnerabilities Flashcards

1
Q

What type of attack can use a hidden password that has been in place since the
application was installed?

A

backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of attack cannot be detected by a NIPS, NIDS, firewall, or a SIEM system, but
can only be detected by using baselines?

A

zero day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

You have just started working at the reception desk of a multinational corporation.
During your induction period, one of the middle managers asks your coworker for some
information. You are not too sure if he is entitled to that information. The next day, when
your coworker has gone to lunch, the middle manager arrives asking you for the same
information, this time updated a little. You don’t want to be seen as different from other
employees, and so you give him the information. What type of attack has just been
launched?

A

social engineering consensus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The CEO has received an email asking him to click on a link and carry out an action so
that his salary information can be updated, as the company is moving to a new financial
system. What type of attack has just been launched?

A

whaling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Five seconds after connecting to the company’s wireless network, the sessions
drop. What type of wireless attack have I been the victim of?

A

wireless disassociation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A hacker has managed to gain access to my Bluetooth phone and has been texting all of
my friends, announcing that I am going to get married next year. This information is false.
What type of attack has just been carried out?

A

bluejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A hacker has managed to gain access to my Bluetooth phone and has been able to steal
my contact information. What type of attack has been carried out?

A

blue snarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What type of attack is an interception attack where the data has been replayed
immediately?

A

mitm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of attack is an interception attack where the data has been replayed at a later
date?

A

replay

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

two ways to prevent sql injection?

A

stored procedures and input validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What type of attack interferes with my wireless network?

A

jamming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

My domain controller uses NTLM authentication. What type of attack makes it
vulnerable?

A

pass the hash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

how to prevent pass the hash?

A

kerberos and disable ntlm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the most difficult threat actor to detect and why?

A

insider already in your network and know about it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

An attacker has managed to gain access to your corporate network through a host that
was not fully patched. Once he gained access to that host, he then launched an attack on
your SQL database server so that he could steal your customer’s credit card details. What
type of technique did the attacker adopt?

A

pivoting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

what is resource exchausition?

A

cpu being overloaded

17
Q

What type of attack launches directed IP broadcasts to the border router where the
victim is overloaded with the resulting ping replies? What can you do to mitigate this
attack?

A

smurf attack

18
Q

pharming attack

A

redirects users to malicous site

19
Q

typo squatting

A

a hacker buys domains in similar name in case you mispell website name

20
Q

session hijacking

A

attacker steals cookies from your computer system

21
Q

what is a benefit of key stretching?

A

salting is a form and it prevents duplicate passwords

22
Q

An attacker will try and log into your control panel to launch a ______ attack

A

domain hijacking

23
Q

XSS targets _________, while remote exploits target ______ ______

A

Servers, end users

24
Q

Digital signatures are susceptible to a ___________ _______, a hash-collision attack

A

birthday attack

25
Q

A ________ attack is an interception attack where the data is forwarded at a later time
and can be prevented by using Kerberos authentication that uses updated sequence
numbers and timestamps

A

replay

26
Q

A CEO instructs the finance team to urgently send payment to ABC Limited just before
he boards an aircraft on a transatlantic flight. This is an example of a social engineering
___________ and a __________ attack

A

authority and urgency

27
Q

2 ways to secure IOT devices?

A

change default config and prevent them from directly accessing internet

28
Q

input validation prevents what type of attacks?

A

SQL injection, buffer overflow, and integer overflow

attacks

29
Q

company keeps the keys to all of the offices in the reception area and the workers sign
the keys in and out each day. This is known as ____ ______________, and it prevents people
from taking the keys home with them.

A

key management

30
Q

what is a weak cipher suite?

A

where the key size is less than 1024 bits, and should be

avoided

31
Q

SSL instead of TLS for data in transit could lead to a POODLE attack that is
known as a ___________ attack

A

downgrade

32
Q

main in the browser

A

previously installed trojan intercepts your

online banking transactions without changing the bank’s URL

33
Q

Cross-site reverse forgery

A

user is logged into a legitimate website

and clicks on a link where an embedded program is located.

34
Q

Cross-site reverse forgery also known as what three items?

A

This is also known as a oneclick

attack, XRSF, or CSRF

35
Q

regression testing

A

proprietary code is tested by a consultant for security

flaws

36
Q

single point of failure

A

where one person, device, or service could cause damage to

the company’s systems if it failed