Vulnerabilities Flashcards

1
Q

What is a vulnerability?

A

The absence of a countermeasure or a weakness in one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

List two mitigations for unpatched/legacy systems

A

1) Placing them in a secure VLAN

2) Installing host based IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which method to encrypt a communication channel if other methods are limited?

A

IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What NSA specification addresses methods of spying and protects against them?

A

TEMPEST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What two mitigation methods can be employed against untrusted users?

A

1) Perimeter defense

2) Access control and the point of resource access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Input validation into programs can help prevent what type of vilnerability?

A

Buffer Overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

How does an attacker carry out a DNS poison attack?

A

By refreshing the DNS record when it expires with a different address than the correct one.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can DNS poisoning be mitigated?

A

By limiting from where a DNS server accepts updates from other DNS servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What the first step in the hacking process called?

A

Penetration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Reducing transmission power on an access point and setting it not to broadcast the SSID are two ways to mitigate against what type of vulnerability?

A

War Driving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

If the SSID is not broadcasted, how might an attacker still gain it?

A

Using a wireless protocol sniffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of wireless attack causes stations to be disconnected from the access point?

A

De-authentication attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What devices can locate and alert on rogue access points?

A

Wireless IPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What type of wireless attack involves the attacker mimics an organizations AP to connect your users’ computers to their wireless AP for the purpose of a peer-to-peer attack?

A

Evil Twin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do wireless stations choose an access point?

A

Using the SSID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Disabling the function that makes a bluetooth devices “discoverable” can help prevent what type of attack?

A

Bluesnarfing

17
Q

What type of attack involves an attacker mimicking both communicating parties so they can eavesdrop?

A

Man In The Middle

18
Q

VLAN hopping involves what?

A

an attacker switching VLANS by double tagging a packet or imitating a switch using the dynamic trunking protocol.

19
Q

Attackers are often after PII, what does that mean?

A

Personally Identifiable Information