Threats, Vulnerabilities, and Mitigations (OBJ 2.0) Flashcards

1
Q

Kelly Innovations LLC, an e-commerce website, experienced a sudden spike in its incoming traffic. The website’s logs showed that thousands of requests were being sent per second, originating from just a handful of IP addresses. However, upon further analysis, it was revealed that the request packets contained IP addresses that were not part of the originating addresses. The server quickly became overloaded, preventing access to legitimate users. Which of the following types of malicious activities is BEST described in this scenario?

A

Amplified DDoS attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following email security techniques specifically utilizes email certificates to authenticate and safeguard email content?

A

S/MIME (Secure Multipart Internet Message Extensions) leverages email certificates to both sign and encrypt email content, ensuring both authenticity and confidentiality.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DMARC

A

Domain-based Message Authentication, Reporting & Conformance (DMARC) focuses primarily on the authenticity of the domain from which emails originate, rather than on using certificates to sign and encrypt the email content itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Transport Layer Security TLS

A

Transport Layer Security primarily encrypts the communication path between servers, but it doesn’t use individual email certificates for signing and encrypting content within the email.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SPF

A

Sender Policy Framework verifies the legitimacy of the sender’s IP against a list of approved IPs for the domain, but doesn’t use email certificates for content encryption or signature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A hacktivist group targets a government website, flooding it with traffic to take it offline. They claim responsibility for the attack, stating that their goal is to protest the government’s new policies that they view as oppressive and harmful to civil liberties. What is the primary motivation for this attack?

A

Philosophical Beliefs (Correct)
Service Disruption
Blackmail
Financial Gains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly