Domain 3: System Vulnerabilities Flashcards

1
Q

Method that is used to pass info over a path that is not normally used for communication

A

Covert Channels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Shortcut in a system that allows a user to bypass security checks, such as username/password

A

Backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Backdoor installed by developers to bypass normal system checks during development such as authentication

A

Maintenance hooks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • Virus written macro language

- i.e. Microsoft Office

A

Macro Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Virus that infects the boot sector of a PC, which ensures that the virus loads upon system startup

A

Boot Sector Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Virus that changes itself from the OS and other protective software i.e. antivirus software

A

Stealth Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Virus that changes its signature upon infection of a new system, attempting to evade signature based antivirus software

A

Polymorphic Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Virus that spreads via multiple vectors

A

Multipartite Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Malware that self-propagates

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Malware disguised as a legitimate program

A

Trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Malware that replaces portions of the kernel and/or OS

A

Rootkits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • Neutral technology used to shrink the size of executables

- Often used in malware to evade signature-based malware detection

A

Packers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • Malware that is triggered when a logical condition is met

- i.e. after a set number of transactions, or on a specific data

A

Logic bombs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Antivirus that uses static signatures of known malware

A

Signature-based antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Anomaly-based detection used to identify behavioral characteristics of malware

A

Heuristic-based antivirus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Attacks launched directly from an attacker (the client) to a listening service

A

Server-side attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Attack that initiates from the victim who downloads content from the attacker

A

Client-side attacks

18
Q
  • Small pieces of mobile code that are embedded on other software such as web browsers
  • Programming languages Java and ActiveX
19
Q

Applets that are in a sandbox which segregates the code from the OS

20
Q
  • Applets that use digital certificates to provide security

- Only works on Windows OS

21
Q

Provides consensus guidance on what are considered to be the 10 most significant application security risks

A

Open Web Application Security Project (OWASP) Top 10 Project

22
Q

Language used to store application configuration and output from auditing tools

A

Extensible Markup Language (XML)

23
Q
  • Reduces application architecture down to a functional unit of service
  • Service can be used and reused throughout an organization rather than built within each individual application
A

Service-Orientated Architecture (SOA)

24
Q
  • Allows two different objects to have the same name

- i.e. Two rows may have the same primary key, but different data

A

Polyinstantiation

25
- Happens when a user is able to use lower-level access to learn restricted information - Requires clues (first word) - Mathematical process (second word)
Inference and aggregation
26
Searches large amounts of data to determine patterns
Data Mining
27
Control that restricts the use of mobile devices via policy
Administrative controls
28
Controls installed on mobile devices to mitigate infections
Technical controls
29
- Access control vulnerability that involves theft of data by capturing electromagnetic leaks - Mitigated by enclosing cable in metal shielding or conduit certain types of antennas are resistant also
Emanations
30
Program between the US and UK that mitigates electromagnetic leaks
TEMPEST
31
- Denial of Service (DoS) attack - Attacker sends ICMP echo request packets with a spoofed source address. - Every device that receives a ping request will send an ICMP echo reply to the spoofed source address, which can overwhelm the device at the source address
Smurf
32
- Denial of Service (DoS) attack - Attacker sends UDP packets with a spoofed address to a directed broadcast address. - Each device that receives an UDP broadcasts will send a response to the spoofed address, which can overwhelm the device at the source address
Fraggle
33
- Denial of Service (DoS) attack - Attacker uses a malformed IP packet where the source, destination address, and the port are the same. - When victim at the destination address receives the packet, it can become confused and crash
Local Area Network Denial (LAND)
34
- Denial of Service (DoS) attack - Attacker uses several large overlapping IP fragments - Victim system will attempt to assemble these packets, sometime causing system to crash
Teardrop
35
Name the three TEMPEST countermeasures used to protect against emanation attacks?
1. Faraday cage 2. White noise 3. Control Zones
36
- A room, box or entire building with an external metal skin - Prevents electromagnetic signals (emanations) from exiting or entering the area - Mobile phones, radio stations television stations do not work inside this area
Faraday cage
37
- Broadcasts false traffic at all times to mask and hide the presence of real emanations - Effective when used around the perimeter of an area, it is broadcast outward to protect the internal area where emanations may be needed for normal operations
White noise
38
Implementation of either a Faraday cage or white noise generation or both to protect a specific area in an environment
Control Zones
39
Sends oversized ping packets to the victim, causing the victim to freeze, crash, or reboot
Ping-of-death attacks
40
Use a command and control server to remotely control the zombies to launch attacks on other systems, or to send spam or phishing emails
Bot herders