Topic 2: Attack types Flashcards
How does Eavesdropping/Sniffing attacks impact on the confidentiality, integrity and availability of security?
Confidentiality
Integrity
Availability
Confidentiality
How does Data modification attacks impact on the confidentiality, integrity and availability of security?
Confidentiality
Availability
Integrity
Integrity
How does Spoofing attacks impact on the confidentiality, integrity and availability of security?
Availability
Confidentiality
Integrity
Availability and Confidentiality and Integrity
How does DoS/DDoS attacks impact on the confidentiality, integrity and availability of security?
Availability
Integrity
Confidentiality
Availability
How does MiTM/Replay attacks impact on the confidentiality, integrity and availability of security?
Confidentiality
Integrity
Availability
Confidentiality and Integrity
How does DNS Poisoning attacks impact on the confidentiality, integrity and availability of security?
Integrity
Confidentiality
Availability
Availability
How does Reconnaissance attacks impact on the confidentiality, integrity and availability of security?
Availability
Integrity
Confidentiality
Availability and Integrity and Confidentiality
How does ARP attacks impact on the confidentiality, integrity and availability of security?
Availability
Confidentiality
Integrity
Availability
Which type of phishing targets high value employees?
smishing
spear
vishing
whaling
whaling
You walk back into your office through a secure door after being out to a meeting. Someone you don’t know follows behind you but they have no ID tag and you don’t remember them being in the office before. What type of attack are they attempting?
piggybacking
shoulder surfing
access attack
DoS
piggybacking
Identify the component of security the example attacks MOST impact Availability or Confidentiality?
Denial of Service attack = ?
Brute-force password attack = ?
DNS cache poisoning attack = ?
ARP attack = ?
Denial of Service attack = Availability
Brute-force password attack = Confidentiality
DNS cache poisoning attack = Availability
ARP attack = Availability
You receive an e-mail stating that you have been chosen as a winner in a competition to win a box of free donuts. Inside the e-mail there is a link that, when you click on it, doesn’t seem to do anything however shortly afterwards some users report that the company web portal is down. This is a possible example of a cross-site scripting attack.
True or False
True
Social engineering attempts to exploit what?
the good nature of people
the human tendency to want to help
human targets
all of the above
all of the above
Which of the following is an example of a nonessential protocol?
A. DNS
B. ARP
C. TCP
D. TFTP
D. TFTP (Trivial File Transfer Protocol) is a simpler version of FTP that uses a small amount of memory. It is generally considered to be a nonessential protocol. The Domain Name System service (or DNS service) is required for Internet access and on Microsoft domains. The Address Resolution Protocol (ARP) is necessary in Ethernet networks that use TCP/IP. TCP stands for Transmission Control Protocol, an essential part of most network communications.
A person attempts to access a server during a zone transfer to get access to a zone file. What type of server is that person trying to manipulate?
A. Proxy server
B. DNS server
C. File server
D. Web server
B. DNS servers are the only types of servers listed that do zone transfers. The purpose of accessing the zone file is to find out what hosts are on the network.
Which one of the following can monitor and protect a DNS server?
A. Ping the DNS server.
B. Block port 53 on the firewall.
C. Purge PTR records daily.
D. Check DNS records regularly.
D. By checking a DNS server’s records regularly, a security admin can monitor and protect it. Blocking port 53 on a firewall might protect it (it also might make it inaccessible depending on the network configuration) but won’t enable you to monitor it. Pinging the server can simply tell you whether the server is alive. Purging pointer records (PTR) cannot help to secure or monitor the server.
Which TCP port does LDAP use?
A. 389
B. 80
C. 443
D. 143
A. The Lightweight Directory Access Protocol (LDAP) uses port TCP 389. Note: If you are working with secure LDAP, then you will be using port 636. Port 80 is used by HTTP. Port 443 is used by HTTPS. Port 143 is used by IMAP.