Threats, Vulnerabilities, and Mitigation Flashcards

1
Q

What vulnerability is associated with installing software outside of a manufacturer’s approved software repository?

A

Side loading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is it called when you add random data into a one-way cryptographic hash to help protect against password cracking techniques?

A

Salting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a business email compromise attack? (BEC)

A

An attacker will impersonate a high-ranking authority figure to request sensitive information/actions from employees, like information to a privileged account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What would you deploy to best protect an organization’s internet-facing website from an attacker exploiting a buffer overflow?

A

WAF (Web Application Firewall)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the difference between Phishing and Smishing?

A

Smishing is a variant of Phishing, but is done over SMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A company is required to use certified hardware when building networks. What would address the risks associated with procuring counterfeit hardware?

A

A thorough analysis of the supply chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is password spraying?

A

A type of brute-force attack used to gain access to user accounts by systematically attempting a small number of commonly used passwords against many user accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What string would you block to prohibit access to non-encrypted websites?

A

http://

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is it called when an attacker enables the use of an input field to run commands that can view or manipulate data?

A

SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of data refers to sensitive information present in an R&D employees day-to-day life?

A

Intellectual property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A sys admin received an alert from a file integrity monitoring tool that the hash of the cmd.exe file has changed. No patches were applied in recent times. Which attack most likely occured?

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a mitigation technique for cross-site scripting?

A

Input validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What tool can assist with detecting an employee who has accidentally emailed a file containing a customer’s PII?

A

DLP (Data loss prevention)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is it called when organizations implement access control policies that restrict or allow access to certain resources based on the geographic location of users and devices?

A
  • Geolocation protection
  • Ex. They might limit access to sensitive systems only to users connecting from a specific geographic location
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What would be the best way to block unknown programs from executing?

A

Application allow list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is code signing?

A
  • A process involves applying a digital signature to software
  • Verifies the identity of the developer and ensuring the code has not been altered since it was signed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What could you do if you wanted to ensure the authenticity of the code created by a software development company?

A

Code signing

17
Q

A user logged in remotely after hours and copied large amounts of data to a personal device, what threat does this describe?

A

Insider threat

18
Q

What does Data Loss Prevention (DLP) do?

A

Protects sensitive information from loss, corruption, misuse, or unauthorized access

19
Q

What should an analyst do if the management team wants to reduce the impact of a user clicking links on a phishing message if there is already a phishing campaign in place?

A

Update the EDR policies to block automatic execution of downloaded programs

20
Q

What is the best preventative/remediation action for botnets?

A

Enable DDoS protection

21
Q

What is the best preventative/remediation action for RAT (Remote Access Trojan)?

A

Disable remote access service

22
Q

What is the best preventative/remediation action for worms?

A

Change the default system password

23
Q

What attacker sends multiple SYN packets to a web server from multiple sources?

A

Botnet

24
Q

What attack establishes a connection with a user, which allows the remote commands to be executed?

A

RAT

25
Q

What kind of attack is self-propagating and comprises a SQL database using well-known credentials as it moves through the network?

A

Worm

26
Q

What kind of attack uses hardware to remotely monitor a user’s input activity to harvest an executive’s credentials?

A

Keylogger

27
Q

What is the best preventative/remediation action for a keylogger?

A

Implement MFA using push notification

28
Q

What kind of attack embeds hidden access in an internally developed application that bypasses account login?

A

Backdoor

29
Q

What is the best preventative/remediation action for backdoor attacks?

A

Conduct a code review

30
Q

What security solution should be configured to monitor and block known signature-based attacks on older browser versions with well-known exploits?

A

IPS

31
Q

You receive alerts about an internal system sending a large amount of unusual DNS queries over short periods of time after hours; what is most likely occurring?

A

Data is being exfiltrated

32
Q

What kind of attack takes advantage of database misconfigurations?

A

SQL injection

33
Q

What group of people does whaling target?

A

High-profile executives

34
Q

What should be done first when deploying a DLP solution to prevent the exfiltration of sensitive customer data?

A

Apply classifications to the data

35
Q

What kind of attack targets groups of users by infecting websites they commonly visit?

A

Watering-hole

36
Q

What solution would mitigate a network access vulnerability found in the OS of legacy IoT devices quickly?

A

Segmentation

37
Q

A company’s end users cannot reach external websites. After reviewing data, an analyst discovers that the CPU, disk, and memory usage are minimal but the network interface is flooded with inbound traffic. Network logs show only a small number of DNS queries sent to the server. What is happening?

A

Reflected denial of service

38
Q

What are some signs of a reflected denial of service attack?

A
  • Unable to reach external websites
  • Flooded with traffic
  • Minimal resource usage on the DNS server
39
Q

What vulnerability is exploited when an attacker overwrites a register with a malicious address?

A

Buffer overflow

40
Q

What describes the process of concealing code or text inside a graphical image?

A

Steganography

41
Q

A company is experiencing a web services outage on the public network. The services are up and available but inaccessible. The network logs show a sudden increase in network traffic that is causing the outage. What kind of attack is occuring?

A

DDoS