Common Network Security Threats Flashcards

1
Q

Which type of threat actor promotes an ideology and does not normally conceal their malicious activities?
Instruction: Choose the option that best answers the question.
Answer Choices

Script kiddie

Hacktivist

Nation-state

Organized crime

A

Hacktivist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How are CVEs named?
Instruction: Choose the option that best answers the question.
Answer Choices

Year-CVE-item_that_year

CVE-item_that_year

Year-CVE

CVE-year-item_that_year

A

CVE-year-item_that_year

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the primary incentive for bug bounty hunters?
Instruction: Choose the option that best answers the question.
Answer Choices

Espionage

Peer recognition

Financial gain

Promotion of ideology

A

Financial gain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What can be done to mitigate buffer overflow attacks?
Instruction: Choose all options that best answer the question.
Answer Choices

Enable OSI model monitoring

Install a host-based firewall

Admins must ensure the latest software patches have been applied

Programmers must ensure all user-supplied data is validated

A

Admins must ensure the latest software patches have been applied
Programmers must ensure all user-supplied data is validated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the result of a SYN flood attack?
Instruction: Choose the option that best answers the question.
Answer Choices

Multiple buffer overflows on the server

Multiple half-open connections on the server

Multiple closed sessions on the server

Multiple injection attacks on the server

A

Multiple half-open connections on the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When should an Internet user VPN app be used instead of the Tor browser?
Instruction: Choose the option that best answers the question.
Answer Choices

When the user needs to access a corporate point-to-site VPN over the Internet

When only web browsing must be anonymized over the network

When all device access must be anonymized over the network

When the user needs to access a corporate site-to-site VPN over the Internet

A

When all device access must be anonymized over the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which indicators are commonplace with a DDoS attack?
Instruction: Choose all options that best answer the question.
Answer Choices

Encrypted data files

Numerous connection requests from the same groups of IPs in a short time frame

Sensitive data exfiltration

Abnormally high level of network traffic

A

Numerous connection requests from the same groups of IPs in a short time frame
Abnormally high level of network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What can be done to harden a Wi-Fi network?
Instruction: Choose all options that best answer the question.
Answer Choices

Disable SSID broadcasting

Disable MAC address filtering

Enable SSID broadcasting

Enable MAC address filtering

A

Disable SSID broadcasting
Enable MAC address filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which attributes define an Advanced Persistent Threat (APT)?
Instruction: Choose all options that best answer the question.
Answer Choices

Multiple half-open server connections

Encryption of data files

Backdoor access to a compromised system for a long period of time

Highly skilled attacker

A

Backdoor access to a compromised system for a long period of time
Highly skilled attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How many MITRE attack categories are there?
Instruction: Choose the option that best answers the question.
Answer Choices

6

14

16

5

A

14

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which OWASP Top 10 item related to the violation of the principle of least privilege?
Instruction: Choose the option that best answers the question.
Answer Choices

Insecure design

Broken access control

Injections

Cryptographic failures

A

Broken access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly