Threats, Vulnerabilities, and Mitigation Flashcards

1
Q

What vulnerability is associated with installing software outside of a manufacturer’s approved software repository?

A

Side loading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is it called when you add random data into a one-way cryptographic hash to help protect against password cracking techniques?

A

Salting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a business email compromise attack? (BEC)

A

An attacker will impersonate a high-ranking authority figure to request sensitive information/actions from employees, like information to a privileged account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What would you deploy to best protect an organization’s internet-facing website from an attacker exploiting a buffer overflow?

A

WAF (Web Application Firewall)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the difference between Phishing and Smishing?

A

Smishing is a variant of Phishing, but is done over SMS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A company is required to use certified hardware when building networks. What would address the risks associated with procuring counterfeit hardware?

A

A thorough analysis of the supply chain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is password spraying?

A

A type of brute-force attack used to gain access to user accounts by systematically attempting a small number of commonly used passwords against many user accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What string would you block to prohibit access to non-encrypted websites?

A

http://

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is it called when an attacker enables the use of an input field to run commands that can view or manipulate data?

A

SQL injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What type of data refers to sensitive information present in an R&D employees day-to-day life?

A

Intellectual property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A sys admin received an alert from a file integrity monitoring tool that the hash of the cmd.exe file has changed. No patches were applied in recent times. Which attack most likely occured?

A

Rootkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a mitigation technique for cross-site scripting?

A

Input validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What tool can assist with detecting an employee who has accidentally emailed a file containing a customer’s PII?

A

DLP (Data loss prevention)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is it called when organizations implement access control policies that restrict or allow access to certain resources based on the geographic location of users and devices?

A
  • Geolocation protection
  • Ex. They might limit access to sensitive systems only to users connecting from a specific geographic location
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What would be the best way to block unknown programs from executing?

A

Application allow list

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is code signing?

A
  • A process involves applying a digital signature to software
  • Verifies the identity of the developer and ensuring the code has not been altered since it was signed
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What could you do if you wanted to ensure the authenticity of the code created by a software development company?

A

Code signing

17
Q

A user logged in remotely after hours and copied large amounts of data to a personal device, what threat does this describe?

A

Insider threat

18
Q

What does Data Loss Prevention (DLP) do?

A

Protects sensitive information from loss, corruption, misuse, or unauthorized access

19
Q

What should an analyst do if the management team wants to reduce the impact of a user clicking links on a phishing message if there is already a phishing campaign in place?

A

Update the EDR policies to block automatic execution of downloaded programs

20
Q

What is the best preventative/remediation action for botnets?

A

Enable DDoS protection

21
Q

What is the best preventative/remediation action for RAT (Remote Access Trojan)?

A

Disable remote access service

22
Q

What is the best preventative/remediation action for worms?

A

Change the default system password

23
Q

What attacker sends multiple SYN packets to a web server from multiple sources?

24
Q

What attack establishes a connection with a user, which allows the remote commands to be executed?

25
Q

What kind of attack is self-propagating and comprises a SQL database using well-known credentials as it moves through the network?

26
Q

What kind of attack uses hardware to remotely monitor a user’s input activity to harvest an executive’s credentials?

27
Q

What is the best preventative/remediation action for a keylogger?

A

Implement MFA using push notification

28
Q

What kind of attack embeds hidden access in an internally developed application that bypasses account login?

29
Q

What is the best preventative/remediation action for backdoor attacks?

A

Conduct a code review

30
Q

What security solution should be configured to monitor and block known signature-based attacks on older browser versions with well-known exploits?

31
Q

You receive alerts about an internal system sending a large amount of unusual DNS queries over short periods of time after hours; what is most likely occurring?

A

Data is being exfiltrated

32
Q

What kind of attack takes advantage of database misconfigurations?

A

SQL injection

33
Q

What group of people does whaling target?

A

High-profile executives

34
Q

What should be done first when deploying a DLP solution to prevent the exfiltration of sensitive customer data?

A

Apply classifications to the data

35
Q

What kind of attack targets groups of users by infecting websites they commonly visit?

A

Watering-hole

36
Q

What solution would mitigate a network access vulnerability found in the OS of legacy IoT devices quickly?

A

Segmentation

37
Q

What are some signs of a reflected denial of service attack?

A
  • Unable to reach external websites
  • Flooded with traffic
  • Minimal resource usage on the DNS server
38
Q

What vulnerability is exploited when an attacker overwrites a register with a malicious address?

A

Buffer overflow

39
Q

What describes the process of concealing code or text inside a graphical image?

A

Steganography

40
Q

A company is experiencing a web services outage on the public network. The services are up and available but inaccessible. The network logs show a sudden increase in network traffic that is causing the outage. What kind of attack is occuring?