Threats, Attacks & Vulnerabilities . Flashcards
Malware comes in many different forms (T/F) ?
True!
What are the major malware types?
- Virus
- Worm
- Trojan Horse
- Remote Access Trojan
- Adware
- Spyware
- Ransomware
- Logic Bomb
- Rootkit
- Back Door
This Malware Type…
Spreads between systems based upon some user action.
Virus
This Malware Type…
Spreads between systems by exploiting vulnerabilities; no user action required.
Worm
This Malware Type…
Masquerades as desirable software to trick user into installing it.
Trojan Horse
This Malware Type…
Trojan horse that allows an attacker to gain remote access to a system.
Remote Access Trojan
This Malware Type…
Displays advertisements on the user’s system to generate ad revenue.
Adware
This Malware Type…
Monitors user activity, such as keystrokes and web visits.
Spyware
This Malware Type…
Encrypts user files and demands a ransom before releasing the key.
Ransomware
This Malware Type…
Encrypts user files and demands a ransom before releasing the key.
Ransomware
This Malware Type…
Waits until certain conditions are met before triggering a malicious action.
Logic Bomb
This Malware Type…
Elevated privileges of a normal user to gain administrative rights.
Rootkit
This Malware Type…
Provides an unauthorized mechanism for accessing a system.
Backdoor
_________ engineering attacks manipulate individuals to gain _________ access or information.
- Social
- Unauthorized
What are the different social engineering attack types?
- Phishing
- Spear Phishing
- Whaling
- Tailgating
- Dumpster Diving
- Shoulder Surfing
- Watering Hole
This Attack Type…
Solicits information via email.
Phishing
This Attack Type…
Solicits information via highly targeted email designed for one person.
Spear Phishing
This Attack Type…
Targets high value individuals, such as senior executives.
Whaling
This Attack Type…
Accessed a building by having someone hold the door open.
Tailgating
This Attack Type…
Discovers sensitive information discovered in the trash.
Dumpster Diving
This Attack Type…
Monitors user activity by watching them as they enter/read information.
Shoulder Surfing
This Attack Type…
Places malware on a site where users are known to congregate.
Watering Hole
What are the seven main mechanisms that social engineering attacks exploit?
- Authority
- Intimidation
- Consensus
- Scarcity
- Familiarity
- Trust
- Urgency
_________ kiddies are generally ______-skilled attackers seeking a quick thrill.
- Script
- Low
What are Advanced Persistent Threats (APTs)?
Extremely sophisticated attackers often sponsored by government agencies.
________ ________ ________ uses tools like nmap to check for active systems and open ports.
Network Discovery Scanning
What are the 4 common scanning techniques?
- TCP SYN
- TCP Connect
- TCP ACK
- Xmas
This Type of Scanning Technique…
Scans send a single packet with the SYN flag set.
TCP SYN
This Type of Scanning Technique…
Scans attempt to complete the three way handshake.
TCP Connect
This Type of Scanning Technique…
Scans seek to impersonate an established connection.
TCP ACK
This Type of Scanning Technique…
Scans set the FIN, PSH, and URG flags.
Xmas
Network vulnerability scanning first discovers active services on the network and then probes those services for known vulnerabilities (T/F)?
True!
_____ _______ vulnerability scans use tools that specialize in probing for web application weaknesses.
Web application
The vulnerability management workflow includes three basic steps, what are they?
- Detection
- Remediation
- Validation
________ _________ goes beyond vulnerability scanning and attempts to exploit vulnerabilities.
Penetration Testing
What are the five steps of Penetration Testing?
- Planning
- Information Gathering & Discovery
- Vulnerability Scanning
- Exploitation
- Reporting
How many types of Penetration Tests are there?
Three
What are the types of Penetration Tests?
- White Box
- Black Box
- Gray Box
In WHITE BOX penetration tests, testers have full access to information about the target systems (T/F)?
True!
In BLACK BOX penetration tests, testers conduct their work ______ ______ knowledge of the target environment.
without any
This type of penetration test resides in the MIDDLE, providing testers with PARTIAL knowledge about the environment.
Gray Box
______ tags is a technology that can assist with asset tracking and inventory control of mobile devices.
RFID
The following Brute Force Attack is characterised as Online or Offline?
- An attacker usually only has a limited number of attempts before being locked out of a system.
Online
The following Brute Force Attack is characterised as Online or Offline?
- The attack is performed remotely.
Online
The following Brute Force Attack is characterised as Online or Offline?
- An attacker can try as many times as required to crack a password.
Offline
The following Brute Force Attack is characterised as Online or Offline?
- The attack is performed locally.
Offline
The shopping centre in your town has free Wi-Fi access. Each time you try to use the Wi-Fi, you are first directed to a web page where you need to agree to certain rules. Which technology is being described?
Captive Portal
Advanced Encryption Standard is currently not susceptible to this type of attack.
Known Plaintext Attack
A Ciphertext only attack is successful when the plaintext or key can be found (T/F)?
True!
Which of the following attacks has access to the “crib”,
Ciphertext Only Attack OR Known Plaintext Attack?
Known Plaintext Attack