Vulnerabilities and Attacks Flashcards
● 2.2: Explain common threat vectors and attack strategies ● 2.3: Explain various types of vulnerabilities ● 2.4: Given a scenario, you must be able to analyze indicators of malicious activity ● 2.5: Explain the purpose of mitigation techniques used to secure the enterprise ● 4.1: Given a scenario, you must be able to apply common security techniques to computing resources
Scenario: Raj, a network administrator at SecureCorp, notices unusual traffic from a router. After investigation, he discovers the router’s firmware was modified to redirect data to an external server. Which type of hardware vulnerability was exploited?
A. Legacy System
B. Firmware Exploitation
C. Unpatched System
D. Hardware Misconfiguration
Answer: B. Firmware Exploitation
Explanation:
Firmware exploitation occurs when attackers manipulate the low-level software embedded in hardware devices (like routers) to alter their behavior. In this case, the modified firmware redirected traffic, indicating direct tampering with the device’s core software.
Why the other options are incorrect?
A. Legacy System: Refers to outdated hardware/software no longer supported by vendors. While legacy systems can be vulnerable, this scenario explicitly involves firmware modification, not outdated technology.
C. Unpatched System: Relates to missing software updates. Here, the firmware itself was altered, not a failure to apply patches.
D. Hardware Misconfiguration: Involves improper settings (e.g., open ports). This scenario describes firmware manipulation, not configuration errors.
Scenario: A hospital’s MRI machine, running on Windows XP, is flagged for sending unencrypted patient data. The vendor no longer supports the OS. Which vulnerability type does this represent?
A. Firmware Vulnerability
B. Hardware Misconfiguration
C. Legacy System
D. Unpatched System
Answer: C. Legacy System
Explanation:
Legacy systems are outdated technologies that vendors no longer support with updates or patches. Windows XP is unsupported, making the MRI machine vulnerable due to unaddressed security flaws.
Why the other options are incorrect?
A. Firmware Vulnerability: Involves tampering with device-specific software (e.g., BIOS), not unsupported operating systems.
B. Hardware Misconfiguration: Refers to incorrect settings (e.g., default passwords), not outdated software.
D. Unpatched System: Describes systems missing updates for supported software. Here, the OS itself is obsolete and unsupported.
Scenario: After a breach, IT Director Maria discovers a server’s default admin credentials were never changed, allowing unauthorized access. Which vulnerability caused this?
A. Firmware Exploitation
B. Legacy System
C. Hardware Misconfiguration
D. Unpatched System
Answer: C. Hardware Misconfiguration
Explanation:
Hardware misconfiguration involves improper setup, such as failing to change default credentials. This oversight created an easily exploitable entry point.
Why the other options are incorrect?
A. Firmware Exploitation: Requires altering device firmware, not misconfigured credentials.
B. Legacy System: Refers to outdated hardware/software, not configuration errors.
D. Unpatched System: Involves missing software updates, not credential mismanagement.
Scenario: Dion Training’s HVAC controller was hacked due to a known buffer overflow flaw. The vendor released a patch six months ago, but it was never applied. Which vulnerability is this?
A. Legacy System
B. Hardware Misconfiguration
C. Firmware Vulnerability
D. Unpatched System
Answer: D. Unpatched System
Explanation:
Unpatched systems fail to apply vendor-provided updates, leaving known vulnerabilities exposed. Here, the unpatched buffer overflow flaw was exploited.
Why the other options are incorrect?
A. Legacy System: The HVAC controller is likely still supported but not updated. Legacy systems are unsupported by vendors.
B. Hardware Misconfiguration: Involves incorrect settings, not missing patches.
C. Firmware Vulnerability: Refers to flaws in device firmware, not unpatched software vulnerabilities.
Scenario: A factory’s 10-year-old industrial control system was compromised using a publicly documented exploit. The manufacturer discontinued support five years ago. Which vulnerability is this?
A. End-of-Life Hardware
B. Firmware Exploitation
C. Hardware Misconfiguration
D. Legacy System
Answer: A. End-of-Life Hardware
Explanation:
End-of-life (EOL) hardware no longer receives security updates or support from the manufacturer, making it a target for known exploits.
Why the other options are incorrect?
B. Firmware Exploitation: Involves tampering with firmware, not unsupported hardware.
C. Hardware Misconfiguration: Refers to improper settings, not discontinued vendor support.
D. Legacy System: Legacy systems are outdated but might still be supported. EOL hardware is explicitly unsupported.
Scenario: After a breach in a retail chain’s payment terminal, the CISO recommends dividing the network to contain future incidents. Which mitigation technique is this?
A. Hardening
B. Segmentation
C. Patching
D. Isolation
Answer: B. Segmentation
Explanation:
Segmentation divides a network into smaller segments to limit the spread of breaches. This prevents attackers from moving laterally across the entire network.
Why the other options are incorrect?
A. Hardening: Reduces attack surfaces (e.g., disabling ports) but doesn’t segment networks.
C. Patching: Fixes vulnerabilities but doesn’t isolate compromised systems.
D. Isolation: Completely removes a device from the network, which is more extreme than segmentation.
Scenario: A smart thermostat at TechGlobal begins mining cryptocurrency. Forensic analysis reveals malicious code in its low-level device software. Which vulnerability was exploited?
A. Legacy System
B. Firmware Vulnerability
C. Hardware Misconfiguration
D. Unpatched System
Answer: B. Firmware Vulnerability
Explanation:
Firmware vulnerabilities allow attackers to embed malicious code directly into hardware controllers, as seen in the thermostat’s altered firmware.
Why the other options are incorrect?
A. Legacy System: The thermostat isn’t necessarily outdated; the issue lies in its firmware, not age.
C. Hardware Misconfiguration: Involves settings errors, not compromised firmware.
D. Unpatched System: Refers to missing updates, not malicious firmware modifications.
Scenario: A bank cannot replace an unsupported ATM but moves it to a restricted network segment. Which mitigation does this describe?
A. Patching
B. Hardening
C. Isolation
D. Segmentation
Answer: C. Isolation
Explanation:
Isolation removes vulnerable devices from critical networks, minimizing exposure. The ATM is placed in a restricted segment, separate from sensitive systems.
Why the other options are incorrect?
A. Patching: Not applicable here, as the ATM is unsupported and cannot be patched.
B. Hardening: Would involve securing the ATM’s configuration, not isolating it.
D. Segmentation: Divides networks but doesn’t fully isolate devices.
Scenario: An IT team disables unused USB ports and services on workstations to reduce attack vectors. Which mitigation technique is this?
A. Segmentation
B. Hardening
C. Patching
D. Decommissioning
Answer: B. Hardening
Explanation:
Hardening reduces attack surfaces by removing unnecessary features (e.g., USB ports) and services, making systems more secure.
Why the other options are incorrect?
A. Segmentation: Involves dividing networks, not securing individual devices.
C. Patching: Focuses on updating software, not disabling hardware features.
D. Decommissioning: Retires hardware entirely, which isn’t the case here.
Scenario: After a breach linked to an outdated firewall, a company permanently removes it from the network. Which mitigation is this?
A. Patching
B. Segmentation
C. Decommissioning
D. Isolation
Answer: C. Decommissioning
Explanation:
Decommissioning involves retiring vulnerable hardware entirely when updates or isolation are insufficient.
Why the other options are incorrect?
A. Patching: Impossible if the firewall is outdated and unsupported.
B. Segmentation: Divides networks but doesn’t remove the firewall.
D. Isolation: Restricts the firewall’s network access but doesn’t retire it.
Scenario: A technician is troubleshooting a smart thermostat that fails to regulate temperature. The device powers on but doesn’t respond to commands. The manufacturer confirms the issue is due to missing software that controls the thermostat’s hardware. What is missing?
A. Operating System (OS)
B. Firmware
C. Device Driver
D. Mobile Application
Answer: B. Firmware
Explanation:
Firmware provides low-level control over hardware, such as a thermostat’s temperature regulation. Without it, the device cannot function.
A. OS: Manages software applications, not direct hardware control.
C. Device Driver: Facilitates OS communication with hardware but isn’t embedded in the device itself.
D. Mobile App: Interfaces with the device remotely but doesn’t control core hardware operations.
Scenario: A financial institution hires a cybersecurity firm to review firmware in its ATMs. The audit focuses on detecting unauthorized changes, verifying compliance with banking regulations, and identifying exploitable flaws. Which goals does this audit address?
A. Compliance only
B. Vulnerability detection only
C. Integrity and compliance
D. Integrity, compliance, and vulnerability detection
Answer: D. Integrity, compliance, and vulnerability detection
Explanation:
Security auditing evaluates firmware for tampering (integrity), adherence to standards (compliance), and security flaws (vulnerability detection).
Scenario: An IT team disables Telnet and closes port 23 on all routers to prevent unauthorized access. Which mitigation technique is this?
A. Patching
B. Hardening
C. Isolation
D. Decommissioning
Answer: B. Hardening
Explanation:
Hardening reduces attack surfaces by disabling unnecessary services (Telnet) and closing unused ports.
A. Patching: Fixes software flaws but doesn’t disable services.
C. Isolation: Separates compromised devices but doesn’t secure configurations.
D. Decommissioning: Retires hardware entirely, which isn’t the case here.
Scenario: A hospital mandates that all MRI machines use AES-256 encryption for data transmission. Automated tools flag non-compliant devices. Which mitigation is this?
A. Hardening
B. Configuration Enforcement
C. Segmentation
D. Decommissioning
Answer: B. Configuration Enforcement
Explanation:
Configuration enforcement ensures adherence to security standards (e.g., encryption protocols).
A. Hardening: Focuses on reducing attack surfaces, not enforcing policies.
C. Segmentation: Divides networks but doesn’t enforce settings.
D. Decommissioning: Removes devices rather than configuring them.
Scenario: A company replaces 15-year-old firewalls that no longer receive updates and shreds their hard drives. Which mitigation is this?
A. Isolation
B. Hardening
C. Decommissioning
D. Configuration Enforcement
Answer: C. Decommissioning
Explanation:
Decommissioning retires outdated, unsupported hardware permanently.
A. Isolation: Restricts network access but doesn’t remove devices.
B. Hardening: Secures existing devices but doesn’t retire them.
Scenario: After a breach in a factory’s IoT sensors, the sensors are moved to a network segment that can’t communicate with the main server. Which mitigation is this?
A. Segmentation
B. Isolation
C. Hardening
D. Patching
Answer: B. Isolation
Explanation:
Isolation restricts vulnerable devices to a controlled environment to limit breach impact.
A. Segmentation: Divides networks but allows limited communication.
C. Hardening: Secures devices but doesn’t isolate them.
Scenario: A TV remote stops working after a firmware update corrupts its ability to send infrared signals. Which component controls this hardware function?
A. Operating System
B. Mobile App
C. Firmware
D. Cloud Service
Answer: C. Firmware
Explanation:
Firmware directly manages hardware operations like infrared signal transmission.
A. OS: Not present in simple devices like remotes.
B. Mobile App: Interfaces with smart devices but doesn’t control hardware.
Scenario: A bank uses cryptographic checksums to ensure its payment terminals’ firmware hasn’t been altered. Which auditing goal does this achieve?
A. Compliance
B. Vulnerability Detection
C. Integrity
D. Decommissioning
Answer: C. Integrity
Explanation:
Checksums verify firmware hasn’t been tampered with, ensuring integrity.
A. Compliance: Relates to regulatory adherence, not tamper detection.
B. Vulnerability Detection: Identifies flaws, not unauthorized changes.
Scenario: A router’s firmware remains functional after a power outage. Where is this firmware stored?
A. RAM
B. Hard Disk Drive (HDD)
C. Read-Only Memory (ROM)
D. Solid-State Drive (SSD)
Answer: C. Read-Only Memory (ROM)
Explanation:
Firmware is stored in non-volatile memory (e.g., ROM) to persist without power.
A. RAM: Volatile memory erased on power loss.
D. SSD: Stores data but isn’t typically used for firmware.
Scenario: A nuclear power plant disconnects its control systems from the internet and uses physical media for updates. Which mitigation is this?
A. Segmentation
B. Hardening
C. Air-Gapping (Isolation)
D. Configuration Enforcement
Answer: C. Air-Gapping (Isolation)
Explanation:
Air-gapping physically isolates critical systems from external networks.
A. Segmentation: Allows controlled network communication.
Scenario: Sarah pairs her smartphone with a Bluetooth speaker at a café. The speaker connected instantly without asking for a PIN or authentication. Which vulnerability is demonstrated here?
A. Device Spoofing
B. Bluejacking
C. Insecure Pairing
D. BlueBorne
Answer: C. Insecure Pairing
Explanation:
Insecure pairing occurs when devices connect without proper authentication (e.g., no PIN requirement).
A. Device Spoofing: Involves impersonating a legitimate device, which isn’t described here.
B. Bluejacking: Refers to sending unsolicited messages, not pairing.
D. BlueBorne: Airmounted attack spreading malware via Bluetooth, unrelated to pairing.
Scenario: While shopping, Jake receives a pop-up message on his phone saying, “Free gift card! Click here!” via Bluetooth. No data was stolen. Which attack is this?
A. Bluesnarfing
B. Bluejacking
C. Bluebugging
D. Bluesmack
Answer: B. Bluejacking
Explanation:
Bluejacking involves sending unsolicited messages to Bluetooth devices, often for pranks or testing.
A. Bluesnarfing: Theft of data (contacts, messages), which didn’t occur here.
C. Bluebugging: Full device control, which isn’t described.
D. Bluesmack: Denial-of-service attack, which crashes devices.
Scenario: Maria tries to connect to her car’s Bluetooth system but sees two identical “MyCar” devices. She connects to one, but her phone starts transmitting data to an unknown device. Which vulnerability is exploited?
A. On-Path Attack
B. Device Spoofing
C. BlueBorne
D. Insecure Pairing
Answer: B. Device Spoofing
Explanation:
Device spoofing involves mimicking a legitimate device (e.g., duplicate “MyCar”) to trick users.
A. On-Path Attack: Intercepts communication between two devices, not impersonation.
C. BlueBorne: Spreads malware automatically, not spoofing.
D. Insecure Pairing: No authentication, but the scenario focuses on impersonation.
Scenario: After connecting to a public Bluetooth hotspot, Alex notices his call logs and contacts were copied without his knowledge. Which attack occurred?
A. Bluesnarfing
B. Bluebugging
C. Bluejacking
D. Bluesmack
Answer: A. Bluesnarfing
Explanation:
Bluesnarfing steals data (e.g., contacts, logs) via Bluetooth without the user’s consent.
B. Bluebugging: Grants full device control, not just data theft.
C. Bluejacking: Sends messages but doesn’t steal data.
D. Bluesmack: Overloads devices to crash them.