GR Flashcards
(77 cards)
What concept states that defenders must secure every vulnerability, while attackers only need to exploit one?
The asymmetry of defense
What security concept relies on multiple tools / techniques simultaneously?
Defense in depth
Which defense mechanism is primarily designed to monitor and analyze network traffic for suspicious activities?
Intrusion Detection System (IDS)
Which defense mechanism is primarily designed to actively block and prevent malicious activities?
Intrusion Prevention System (IPS)
Name the benefits of proxies?
Can inspect packet contents; Can trace/filter inappropriate requests; Can cache answers for faster responses
What is a firewall?
A firewall is a network device that forwards some network data (i.e., packets) and filters others.
In the context of a firewall, what is the purpose of an allow-list?
Permits only traffic on the list
Which intrusion detection method relies on predefined patterns or signatures of known threats?
Signature-Based
Name legitimate personal security recommendations?
Keep your system up to date with the latest patches; Use a VPN when you are on public networks; Only use strong passwords and do not reuse passwords; Don’t install software unless you absolutely need it; Don’t trust unfamiliar links or attachments in emails; Don’t let people log into your personal network
Name the cyber-attack methology steps?
Gaining Access
Maintaining Access
Scanning
Reconnaissance
Covering Tracks
What’s the difference between the Recon and Scanning phases?
Recon is passive, Scanning is active
This type of malware is disguised as a legitimate program
Trojan horse
This type of malware has elevated privileges and is designed to remain undetected
Rootkit
This type of malware executes when a specified condition is triggered
logic bomb
This type of malware attaches to a “host” file that spreads by user interaction
virus
This type of malware spreads without user intervention
worm
This type of malware bypasses normal authentication mechanisms
backdoor
This type of malware records inputs to your computer
keystroke logger
This type of malware gathers and reports information about a user
spyware
A buffer overflow vulnerability occurs when:
Input exceeds the capacity of a defined storage area.
What type of cyber attack is commonly associated with targeting humans through deceptive emails or messages?
Phishing
Which cybersecurity threat is most closely related to compromising personal computers by exploiting vulns in software?
Malware
If a cyber attack aims to overwhelm and disrupt the functionality of servers, what type of attack is likely occurring?
Denial of Service
What is an attack on websites that involve injecting malicious code to manipulate user interactions?
Cross-Site Scripting