Block 5 Flashcards
(40 cards)
What type of attacks often involving multiple devices usually using a botnet?
DDOS
Blank is an aggregation of computers turning them into robots.
BOTNET
According to the STRIVE model, what threat allows someone to perform an action they are not authorized to do?
elevation of privilege
What is the definition of data diddling?
altering data entry
What type of social engineering targets specific individuals utilizing messaging that appeals to that person?
phishing
Social engineering is what kind of confidence trick?
low technology and non-technical
What type of attacking involves leading infected media in a public place in order to trigger an attack?
bait
What type of attack is a specific form of phishing targeting high-value individuals?
whaling
Blank refers to software or website scripts written to cause undesired effects.
malware
What type of virus executes when the system is booted?
boot sector virus
Ransomware will ______ an entire system until a ransom is paid.
encrypt
What type of malware acts normal and useful until a predefined event occurs?
logic bomb
When moving data offsite, it’s important to ensure how ___ is securing the data.
third party
Ensuring data security when transferring data offsite is crucial.
What is the single biggest drawback to single sign-on services?
attackers have access to multiple servers
This highlights the security vulnerability associated with single sign-on systems.
What are the 4 types of network access control?
- agent less
- agent based
- dissolvable
- permanent
Understanding the types of access control helps in implementing security measures.
Of the 4 access controls, which one runs a check but does not remain installed?
dissolvable
Dissolvable access controls are temporary and are removed after the session.
What were the 3 A’s of the triple A protocol?
- accounting
- authentication
- authorization
These are essential components of security protocols.
Of the 3 triple A protocols, which one logs all resources a user consumes?
accounting
Accounting is crucial for tracking user activity.
Injecting malicious code into web applications is what kind of attack?
cross-site scripting
This type of attack poses significant risks to web application security.
What type of encryption is applied much faster than software encryption?
hardware
Hardware encryption is typically more efficient and secure.
What type of encryption stores processors?
hardware security module
This module is essential for secure processing of cryptographic keys.
What type of encryption module stores cryptographic keys?
trusted platform module
TPMs provide secure storage for cryptographic keys.
Software-based firewalls are also known as what?
- application firewall
- host-based firewalls
- personal firewall
These firewalls offer protection at the application layer.
A packet filtering firewall can filter traffic based on source or destination what?
- port
- IP address
Packet filtering is a fundamental feature of firewalls.