Threats and Vulnerabilities Flashcards

1
Q

CIA triad

A

Confidentiality / integrity / availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Confidentiality

A

Encryption
WPA2 WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Integrity

A

Hashing
Hash MD5 SHA1 SHA256

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Availability

A

Redundancy reliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CVE

A

Common vulnerabilities and exposures
Known vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Zero day

A

Unknown vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

5 vulnerability types

A

Non-compliant systems
Unpatched
Unprotected
EOL-OS
BYOD

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

3 DOS types

A

Flood attack - ping flood / SYN flood
Permanent DOS - forceful reflashing
Fork bomb - fills up a processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DDOS type uses zombies or bots

A

DNS amplification - flood a website with DNS requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

3 Spoofing types (faking identity)

A

Ip spoofing - faking ip address (layer 3)
Mac spoofing - (layer 2)
ARP spoofing - arp request to pair ip+mac

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

4 on path attacks
(When a attacker puts themselves in the middle)

A

ARP poisoning
DNS poisoning
Rouge WAP
Rouge Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SSL stripping

A

Turns HTTPS into HTTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Downgrade attack

A

Lowers the encryption version

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SQL injection

A

Structured Query Language

Insert SQL info into input data on a web application

Example replace password with ‘or 1=1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

XSS

A

Cross site scripting
Embeds script into website to effect the USER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

XSRF

A

Cross Site Request Forgery
Forces authenticated user to effect the SERVER

17
Q

4 Password Cracker types

A

Password guessing
Dictionary attack
Brute force attack
Cryptanalysis attack (compared hashes to a lookup table called a rainbow table)

18
Q
  1. Symptoms of infection with malware
A

Hard drive, files, or apps aren’t accessible
Strange noises
Unusual error messages
Display looks strange
Jumbled printouts
Double file extensions
New files or missing files
System restore won’t function

19
Q

Sign of infection and how to counter

A

Computer is acting funny or strange
Boot into safe mode
Or boot from external and scan with antivirus

20
Q

Phishing

A

Social engineering attack from supposedly reputable source trying to get victim to divulge information

21
Q

Spear phishing

A

Targeted small group phishing

22
Q

Whaling

A

Phishing fixed on executives

23
Q

Smishing

A

Sms phishing (texting)

24
Q

Vishing

A

Voice phishing

25
Q

BEC

A

Business email compromise
Taking over a executives email

26
Q

Pharming

A

Tricks user into imputing info by redirecting to a website controlled by attacker

27
Q

Elicitation

A

Ask people questing to get information or do something

28
Q

Pretexing

A

Giving some kind of know or assumed info to get someone to share more

29
Q

Social engineering

A

Hacking people

30
Q

Tailgating

A

Following an authorized person into a secure area

31
Q

Piggybacking

A

Tailgating with employees knowledge or consent

32
Q

Shoulder surfing

A

Looking over someone’s shoulder

33
Q

Evil twin

A

A fraudulent WAP

34
Q

Karma attack

A

Finds devices looking for WAPs they’ve previously connected to and matches the SSID they’re looking for

35
Q

Captive portal

A

Web page you’re obligated to visit prior to access being granted