Chapter 3 - Network Security Concepts Flashcards

1
Q

what is RISK

A

likelihood of a threat to exploit the vulnerability of an asset
probability of the occurrence of an event and its consequences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what is THREAT

A

a potential danger to a company’s assets, data or network functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is data loss or data exfiltration

A

when data is intentionally or unintentionally lost, stolen or leaked to outside world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

common data loss vectors

A
  • email/social networking
  • unencrypted devices
  • cloud storage devices
  • removable media
  • hard copy
  • improper access control (weak or compromised passwords)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what kind of hacker:

  • commit crimes and may do unethical things but not for personal gain or to cause damage
  • may disclose vulnerability to affected org
A

Grey Hat Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

term that includes any device, person, group or nation state that is intentionally or unintentionally the source of an attack?

A

threat actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what is a vulnerability broker

A

usually a grey hat hacker who attempts to discover exploits and reports them to vendors, sometimes for rewards

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what type of attack does the threat actor rely on users to install to help exploit the security gaps

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

types of malware

A
  • virus
  • Trojan horse
  • Adware
  • Ransomeware
  • rootkit
  • spyware
  • worm
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

networks are susceptible to these kinds of attacks

A
  • reconnaissance attacks
  • access attacks
  • DoS attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

techniques used by threat actors to conduct recon attacks

A
  • perform an info query of a target
  • initiate ping sweep of target network
  • initiate a port scan of active IP addresses
  • run vulnerability scanners
  • run exploitation tools
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

access attacks exploits known vulnerabilities in…

A

authentication services, FTP services and web services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

types of access attacks include

A
  • social engineering
  • password attacks
  • spoofing attacks
  • trust exploitations (threat actor uses unauthorized privileges to gain access to a system)
  • port redirections
  • MITM attack
  • buffer overflow attacks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

this tool was designed to help white hat hackers and other network security professionals create social engineering attacks to test their own networks

A

SET - Social Engineering Toolkit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what are the two types of DoS and DDoS attack

A
  • overwhelming quantity of traffic

- maliciously formatted packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

a collection of zombies is called

A

botnet

17
Q

how does Smurf attack overwhelm a target host?

A
  1. Amplification - threat actor forwards ICMP echo request msgs to many hosts. These msgs contain source IP address of the victim
  2. Reflection - hosts all reply to spoofed IP of the victim to overwhelm it
18
Q

what info can a threat actor gather using ICMP attacks

A
  • map out the network topology
  • discover hosts that are reachable/active
  • identify host OS
  • state of firewall
19
Q

two types of IP address spoofing attacks:

A
  • non-blinding spoofing - threat actor can see traffic btwn host and the target; can determine firewall state and sequence-number prediction and can hijack authorized session
  • blind spoofing - threat actor can’t see traffic btwn host and target; used in DoS attacks
20
Q

when does a threat actor use MAC add attack?

A

when threat actor has access to internal network