Attacks, Threats, and Vulnerabilities Flashcards
1
Q
Phishing
A
2
Q
Smishing
A
3
Q
Vishing
A
4
Q
Spam
A
5
Q
Spim
A
6
Q
Spear phishing
A
7
Q
Dumpster diving
A
8
Q
Shoulder surfing
A
9
Q
Pharming
A
10
Q
Tailgating
A
11
Q
Eliciting information
A
12
Q
Whaling
A
13
Q
Prepending
A
14
Q
Identity fraud
A
15
Q
Invoice scams
A
16
Q
Credential harvesting
A
17
Q
Reconnaissance
A
18
Q
Hoax
A
19
Q
Impersonation
A
20
Q
Watering hole attack
A
21
Q
Typosquatting
A
22
Q
Pretexting
A
23
Q
Influence campaign
A
24
Q
Hybrid warfare
A
25
Authority
26
Intimidation
27
Consensus
28
Scarcity
29
Familiarity
30
Trust
31
Urgency
32
Ransomware
33
Trojans
34
Worms
35
PUPs
36
Fileless virus
37
Command and control
38
Bots
39
Cryptomalware
40
Logic bombs
41
Spyware
42
Keyloggers
43
RAT
44
Rootkit
45
Backdoor
46
Spraying (password attack)
47
Dictionary (password attack)
48
Brute Force (password attack)
49
Rainbow table (password attack)
50
Plaintext/Unencrypted (password attack)
51
Malicious USB cable
52
Malicious flash drive
53
Card cloning
54
Skimming
55
Adversarial AI
56
Supply-chain attacks
57
Cloud based vs On-premises attacks
58
Birthday (Cryptographic attack)
59
Collision (Cryptographic attack)
60
Downgrade (Cryptographic attack)
61
Privilege escalation
62
Cross-site scripting
63
SQL injection
64
DLL injection
65
LDAP injection
66
XML injection
67
Pointer/object dereference
68
Directory traversal
69
Buffer overflows
70
Race conditions
71
Error handling
72
Improper input handling
73
Replay attack
74
Integer overflow
75
Request forgeries
76
API attacks
77
Resource exhaustion
78
Memory leak
79
SSL stripping
80
Shimming (Driver manipulation)
81
Refactoring (Driver manipulation)
82
Pass the hash
83
Evil twin (wireless)
84
Rogue AP
85
Bluesnarfing
86
Bluejacking
87
Disassociation
88
Jamming
89
RFID
90
NFC
91
IV
92
On-path attack
93
ARP poisoning
94
MAC flooding
95
MAC cloning
96
Domain hijacking
97
DNS poisoning
98
URL redirection
99
Domain reputation
100
DDoS
101
Malicious code or script execution
102
APT
103
Insider threat
104
State actor
105
Hacktivist
106
Script kiddies
107
Criminal syndicates
108
Hackers
109
Shadow IT
110
Competitors
111
Direct access (vector)
112
Wireless (vector)
113
Email (vector)
114
Supply chain (vector)
115
Social media (vector)
116
Removeable media (vector)
117
Cloud (vector)
118
OSINT
119
Closed/proprietary threat intelligence
120
Vulnerability databases
121
Public/private info-sharing centers
122
Dark web
123
Indicators of compromise
124
AIS
125
Predictive analysis
126
Threat map
127
File/code repository
128
Threat hunting
129
Vulnerability scans
130
Syslog/SIEM
131
SOAR
132
Pentesting
133
Passive/active reconnaissance
134
Exercise types