Chap 1 and Chap 2 Flashcards
Threats, Attacks and Vulnerabilities Architecture and Design (209 cards)
Chap1-8: Susan is analyzing the source code for an application and discovers a pointer de-reference and returns NULL. This causes the program to attempt to read from the NULL pointer and results in a segmentation fault. What impact could this have for the application?
A- A data breach
B- A denial-of-service condition
C- Permissions creep
D- Privilege escalation
B- A denial-of-service condition
Chap1-10: Rick wants to make offline brute force attacks against his password file very difficult for attackers. Which of the following is not a common technique to make passwords harder to crack?
A- Use of a Salt
B- Use of a Pepper
C- Use of a purpose built password hashing algorithm
D- Encrypting password plain text using symmetric encryption
D- Encrypting password plain text using symmetric encryption
Chap1-13: Chris needs visibility into connection attempts through a firewall because he believes that a TCP handshake is not properly occurring. What security information and event management (SIEM) capability is best suited to troubleshooting this issue?
A- Reviewing reports
B- Packet Capture
C- Sentiment Analysis
D- Log collection and Analysis
B- Packet Capture
Chap 1-20: You have been asked to test your company network for security issues. The specific test you are conducting involves primarily using automated and semiautomated tools to look for known vulnerabilities with the various systems on your network. Which of the following best describes this test?
A- Vulnerability scan
B- Penetration test
C- Security audit
D- Security test
A- Vulnerability scan
Chap 1-24: The organization that Mike works in find that one of their domains is directing traffic to a competitor’s website. When Mike checks, the domain information has been changed, including the contact and other administrative details for the domain. If the domain had not expired, what has most likely occured?
A- DNS hijacking
B- An on-path attack
C- Domain hijacking
D- A zero-day attack
C- Domain hijacking
Chap 1-30: Alice wants to prevent SSRF attacks. Which of the following will not be helpful for preventing them?
A- Removing all SQL code from submitted HTTP queries
B- Blocking hostnames like 127.0.0.1 and localhost
C- Blocking sensitive URLs like /admin
D- Applying whitelist-based input filters
A- Removing all SQL code from submitted HTTP queries
Chap 1-34: While investigating a malware outbreak on your company network, you discovery something very odd. There is a file that has the same name as a Windows system DLL, and it even has the same API interface, but it handles input very differently, in a manner to help compromise the system, and it appears that applications have been attaching to this file, rather than the real system DLL. What best describes this?
A- Shimming
B- Trojan Horse
C- Backdoor
D- Refactoring
A- Shimming
Shimming is a form of attack that targets a system’s security measures, making it an increasingly sophisticated cyber security threat. It works by creating a shim to buffer between a legacy program and the operating system, allowing attackers to intercept an API and change the arguments passed, redirect the operation or handle the data in some other way. This technique was first used with EMV chip cards as ATM skimming is not effective on these cards. In 2015, police departments worldwide started finding ATMs compromised with advanced new “shimming” devices made to steal data from chip cards. To protect against shimming attacks, organizations should be aware of uncommon techniques that can be leveraged to maintain persistence and used from within user space.
Chap 1-38: Why is SSL stripping a particular danger with open WiFi networks?
A- WPA2 is not secure enough to prevent this.
B- Open hotspots do not assert their identity in a secure way.
C- Open hotspots can be accessed by any user
D- 802.11ac is insecure and traffic can be redirected
B- Open hotspots do not assert their identity in a secure way.
Chap 1-45: Dennis uses an on-path attack to cause a system to send HTTPS traffic to his system and then forwards it to the actual server the traffic is intended for. What type of password attack can he conduct with the data he gathers if he captures all traffic from a login form?
A- A plain text password attack
B- A pass-the-hash attack
C- A SQL injection attack
D- A cross site scripting attack
A- A plain text password attack
Chap 1-50: Your Wireless network has been breached. It appears the attacker modified a portion of data used with the stream cipher and used this to expose wirelessly encrypted data. What is this attack called?
A- Evil twin
B- Rogue WAP
C- IV Attack
D- WPS Attack
C- IV Attack
An initialization vector (IV) attack is an attack on wireless networks. It modifies the IV of an encrypted wireless packet during transmission. Once an attacker learns the plaintext of one packet, the attacker can compute the RC4 key stream generated by the IV used.
Chap 1-57: John has discovered that an attacker is trying to get network passwords by using softrware that attempts a number of passwords from a list of common passwords. What type of attack is this?
Dictionary
Rainbow Table
Brute Force
Session Hijacking
Dictionary
Chap 1-65 Matt discovers that a system on his network is sending hundreds of Ethernet frames to the switch it is connected to, with each frame containing a different source MAC address. What type of attack has he discovered?
Etherspam
MAC flooding
Hardware spoofing
MAC Hashing
MAC Flooding
Chap 1-71: Amanda scans a Red Hat Linux server that she believes is fully patched and discovers that the Apache version on the server is reported as vulnerable to an exploit from a few months ago. When she checks to see if she is missing patches, Apache is fully patched. What has occurred?
A false positive
An automatic update failure
A false negative
An Apache version mismatch
A false positive
This is an example of a false positive. A false positive can cause a vulnerability to show that was not actually there. This happens sometimes when a patch or fix is installed but the application does not change in a way that shows the change, and it has been an issue with updates where the version number is the primary check for the vulnerability. When a vulnerability scanner sees a vulnerable version number but a patch has been installed that does not update it, a false positive report can occur. A false negative would report a patch or fix where there was actually a vulnerability. Automatic updates were not mentioned, nor was a specific Apache version
Chap 1-79: Your company has hired an outside security firm to perform various tests of your network. During the vulnerability scan, you will provide the company with logins for various systems (i.e.: database server, application server, web server, etc..) to aid in their scan. What best describes this?
A known environment Test
A gray-box test
A credentialed scan
An intrusive scan
A credentialed scan
Chap 1-85: Elizabeth is Investigation a network breach at her company. She discovers that a program was able to execute code within the address space of another process by using the target process to load a specific library. What best describes this attack?
Logic Bomb
Session Hijacking
Buffer Overflow
DLL Injection
DLL Injection
In a DLL Injection, the malware attempts to inject code into the process of some library. This is a rather advanced attack. Session Hijacking is incorrect because this is done by taking over an authenticated session
Chap 1-87: What is the primary difference between an intrusive and non-intrusive vulnerability scan?
An intrusive scan is a penetration test
A non- intrusive scan is just a document check
An intrusive scan could potentially disrupt operations
A non-intrusive scan won’t find most vulnerabilities
An intrusive scan could potentially disrupt operations
Chap 1-90: What two techniques are most commonly associated with a pharming attack?
Modifying the hosts file on a PC or exploiting a DNS vulnerability on a trusted DNS server
Phishing many users and harvesting email addresses from them
Phishing many users and harvesting passwords from them
Spoofing DNS server IP addresses or modifying the hosts file on a PC
Modifying the hosts file on a PC or exploiting a DNS vulnerability on a trusted DNS server
Pharming attempts to redirect traffic intended for a legitimate site to another malicious site. Attackers most often do this by changing the local hosts file or by exploiting a trusted DNS server
Chap 1-96 What type of attack involves adding an expression or phrase such as adding “SAFE” to mail headers?
Pretexting
Phishing
SQL Injection
Prepending
Prepending
Prepending
Not Commonly used: specific to CompTIA; Can mean one of 3 things:
1- Adding an expression or phrase to an email subject line or headers to protect or fool users
2- Adding data as part of an attack
3- Social Engineers may prepend information by inserting it into a conversation to get targets to think about things the attacker wants them to
Chap 1-97: Charles wants to ensure that his outsourced code development efforts are as secure as possible. Which of the following is not a common practice to ensure secure remote code development?
Ensure developers are trained on secure coding techniques
Set defined acceptance criteria for code security
Test code using automated and manual security testing systems
Audit all underlying libraries used in the code
Audit all underlying libraries used in the code
Chap 1-104: Valerie is responsible for security testing applications in her company. She has discovered that a web application, under certain conditions, can generate a memory leak. What type of attack would this leave the application vulnerable to?
DoS
Backdoor
SQL Injection
Buffer Overflow
DoS
Chap 1-105: The mobile game that Jack has spent the last year developing has been released, and malicious actors are sending traffic to the server that runs it to prevent it from competing with other games in the App Store. What type of denial-of-service attack is this?
Network DoS
Operational Technology DDoS
GDos
Application DDos
Application DDoS
This is an example of an application DDoS aimed at a gaming application. A network DDoS would be aimed at network technology, either the devices or protocols that underly networks. An operational technology (OT) DDoS targets SCADA, ICS, utility or similar operational systems. GDoS does not exist
Pepper
In cryptography, a pepper is a secret added to an input such as a password during hashing with a cryptographic hash function. This value differs from a salt in that it is not stored alongside a password hash, but rather the pepper is kept separate in some other medium, such as a Hardware Security Module.[1] Note that the National Institute of Standards and Technology never refers to this value as a pepper but rather as a secret salt. A pepper is similar in concept to a salt or an encryption key. It is like a salt in that it is a randomized value that is added to a password hash, and it is similar to an encryption key in that it should be kept secret. A pepper performs a comparable role to a salt or an encryption key, but while a salt is not secret (merely unique) and can be stored alongside the hashed output, a pepper is secret and must not be stored with the output. The hash and salt are usually stored in a database, but a pepper must be stored separately to prevent it from being obtained by the attacker in case of a database breach.[2] Where the salt only has to be long enough to be unique per user[dubious – discuss], a pepper should be long enough to remain secret from brute force attempts to discover it (NIST recommends at least 112 bits).
Segmentation Fault
In computing, a segmentation fault (often shortened to segfault) or access violation is a fault, or failure condition, raised by hardware with memory protection, notifying an operating system (OS) the software has attempted to access a restricted area of memory (a memory access violation). On standard x86 computers, this is a form of general protection fault. The operating system kernel will, in response, usually perform some corrective action, generally passing the fault on to the offending process by sending the process a signal. Processes can in some cases install a custom signal handler, allowing them to recover on their own,[1] but otherwise the OS default signal handler is used, generally causing abnormal termination of the process (a program crash), and sometimes a core dum