Vulnerablities of misconfiguration, mobile devices, and zero-day Flashcards

1
Q

Open permissions is increasingly common w/-

A

Cloud storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Insecure protocols that aren’t encrypted include:

A

Telnet, FTP, SMTP, IMAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Use encrypted versions such as:

A

SSH, SFTP, IMAPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Mirai botnet

A

Takes advantage of default configurations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Solutions to open ports:

A

Have it managed with a firewall, to manage traffic flows and allow or deny based on port # or app.
**Always test & audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Jailbreaking

A

allow users to bypass the restrictions set by a device, specifically Apple.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Rooting

A

gaining admin access & bypassing restrictions, specifically Android.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Sideloading

A

Installation of an app on a mobile device without using the app store.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Zero-day exploit

A

cyberattack vector that takes advantage of an unknown or unaddressed security flaw in software, hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly