General Flashcards
(159 cards)
Denies all traffic implicitly then allows based on rules.
Restrictive Firewall
Compares one packet at a time against rule set
Stateless Firewall
Maintains a state table of traffic connections and flows
Stateful firewall
Provides advanced malware protection and cloud participation
NGFW (Next Generation Firewall)
Uses traditional ACLS and inspects rules applied to interfaces
Classic firewalls
Permits all traffic implicitly and then denies based on rules
Permissive firewall
[Hijacking and Session Hijacking Attacks]
Cross-Site Scripting (XSS)
Affects hosts and web applications
Vulnerable website (injection attack)
Client browser trusts
Goal is to access personal info (session cookies)
User does not have to be authenticated
[Hijacking and Session Hijacking Attacks]
Cross-Site Request Forgery (XSRF)
Attempt to force use to executive unwanted actions on a web app
Targets ‘state changing’ request (ie transferring funds, changing an email address, etc…)
Usually involves social engineering (sending link via chat or email)
Requires that the user to already be authenticated, credential are present in the browser
[Public Key Infrastructure (PKI) Components
Certificate Revocation List (CRL)
Digital certificates can be revoked before they are set to expire
Main reason for for revoking a certificate:
Key compromise (44%)
Company ceased operations (26%)
A CRL contains a list of certificate serial numbers that have been issued by the CA and then revoked
Which specific type of malware often targets the BIOS, boot loader, kernel, or system files, and is difficult to detect since it is often initiates before the operating system has fully booted
Root kit
What category of malware can be actually be an entire operating system, smart device, gaming system, or even an automobile?
Spyware
Which statement is false about key loggers?
False: They can all evade special on-screen keyboard software.
True: They can also be used to study human-computer collaboration
They are used by spyware to capture passwords and credits card input.
They are also used to track employees or family members to adhere to acceptable use
Which type of virus simultaneously attacks the boot sector and executable files so that it combines the characteristics of file infector and boot sector viruses?
Multipartite
What is the function that Bots and Botnets do not perform
Do not: Corrupt routing tables
Do: Exfiltrate data
Scan memory
Log keystrokes
Mine cyber currency
When searching the Common Vulnerabilities and Exposures (CVE) list’s National Vulnerabilities Data (NVD), what scoring information is provided for each vulnerability?
Exploitability Subscore
CVSS Base Score
Impact Subscore
Which statement is not true concerning malware worms?
Not true: a worm usually spreads with user action and distributes throughout a single system kernel, components, and processes.
True: it is a special form of self-replicating virus
Classic example are Sasser, ILOVEYOU, Conflicker, and Stuxnet
A worm can consume resources, infiltrate data, or simply cause the CPU to waste cycles
Which one is not likely to be a common ransomware vector?
Not likely: Digitally signed upgrade
Likely: Powershell file
Infected website
Word macro
Archive file
Which is a specific form of malware, often part of multistage exploits, that is known for creating back doors to C&C (Command & Control) servers giving crackers access to a system?
RAT
What is it called when cryptomalware is delivered when a user innocently visits an infected website and downloads and installs it without their knowledge?
Drive-by
What team describes the malware that bundles up different type of malicious code into a single package and delivers it in am email attachment?
Polymorphic packer
Which specific form of malicious software is often used to generate a covert channel so that the remote attacker can access and control the system even on phones and other mobile devices?
Back door
Which of the following my expose you organization or a user to exploits?
Ransomware
Poor database RBAC
Hackivism
Spear phishing
Which statement is true concerning resources exhaustion?
It is an attack on availability
True or False
All architecture and design methodologies have weaknesses and vulnerabilities?
True