Lecture 8a Flashcards

(53 cards)

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What do threat actors prioritize in their attacks?

A

Targeting networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What can exploiting a single network vulnerability expose?

A

Hundreds or thousands of devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are some attacks that target a network or processes relying on a network?

A

Interception attacks Layer 2 attacks DNS attacks Distributed denial of service attacks Malicious coding and scripting attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Man-in-the-Middle (MITM) attack?

A

A threat actor positioned between two parties to eavesdrop or impersonate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the two phases of a typical MITM attack?

A

Intercepting traffic and decrypting transmissions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does a replay attack do?

A

Makes a copy of a legitimate transmission and uses it later

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What techniques do threat actors use to steal an active session ID?

A

Network attacks endpoint attacks and Man-in-the-Browser (MITB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Man-in-the-Browser (MITB) attack?

A

An attack intercepting communication between a browser and computer to steal or manipulate data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Layer 2 in the OSI model responsible for?

A

Dividing data into packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is ARP poisoning?

A

Manipulating the Address Resolution Protocol to link IP addresses to wrong MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are common MAC spoofing attacks?

A

MAC cloning and MAC flooding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What happens in a MAC cloning attack?

A

Attacker spoofs a valid MAC address and the switch updates its MAC table incorrectly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What happens in a MAC flooding attack?

A

Attacker overflows switch MAC table with fake MAC addresses to disrupt normal traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does DNS stand for?

A

Domain Name System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What happens in a DNS-based attack?

A

A DNS address is substituted to redirect a computer to a malicious device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are two consequences of a successful DNS attack?

A

URL redirection and damage to domain reputation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is DNS poisoning?

A

Modifying a local DNS lookup table to point to a malicious domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Where can DNS poisoning occur?

A

Local host table or external DNS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is DNS hijacking?

A

Infecting an external DNS server with malicious IP addresses to redirect users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

How do attackers exploit DNS hijacking?

A

By exploiting protocol flaws to insert fraudulent DNS entries into authentic DNS servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a denial of service attack?

A

An attack to prevent authorized users from accessing a system by overwhelming it with requests

23
Q

What is a distributed denial of service (DDoS) attack?

A

A DoS attack using many infected devices to flood a server with requests

24
Q

What types of languages are used in malicious coding and scripting attacks?

A

PowerShell VBA Python and Bash

25
What is PowerShell used for in attacks?
Injecting code into processes bypassing security without storing code on disk
26
What is VBA commonly used for in attacks?
Creating malicious macros to automate harmful tasks
27
What protections has Microsoft implemented against VBA macro malware?
Protected View Trusted Documents and Trusted Location
28
What precautions should be taken when using Python to avoid vulnerabilities?
Use latest Python version keep updated on vulnerabilities careful string formatting and use vetted libraries
29
What is Bash?
The command language interpreter for Linux and UNIX used for scripting
30
What do network reconnaissance and discovery tools do?
Determine the strength and weaknesses of a network
31
Name a Kali Linux tool that gathers information about emails usernames and subdomains.
theHarvester
32
What is dnsenum used for?
Listing DNS information of a domain
33
What does the tool Nessus do?
Vulnerability assessment
34
What does the Linux command head do?
Displays the first 10 lines of a file
35
What does the Linux command tail do?
Displays the last 10 lines of a file
36
What does the Linux command grep do?
Searches for a keyword in files
37
What is PowerShell?
A powerful scripting tool for task automation and configuration management
38
What is Wireshark?
A GUI tool for capturing and analyzing network packets
39
What is Tcpdump?
A command line packet analyzer
40
What is a Faraday cage used for in hardware security?
Preventing electromagnetic spying by blocking electromagnetic fields
41
What are some physical security controls?
External perimeter defenses internal physical security controls and computer hardware security
42
What is industrial camouflage in physical security?
Making a building's presence nondescript to prevent detection
43
What is a bollard used for?
A sturdy post blocking vehicles from entering secured areas
44
What are examples of personnel used in external perimeter defense?
Security guards CCTV monitoring drones and robot sentries
45
What is a mantrap in internal physical security?
A device controlling two interlocking doors to create an air gap between secure and nonsecure areas
46
What is Protected Cable Distribution?
Cable conduits designed to protect classified data transmissions between secure areas
47
Why is water not recommended for fire suppression in data centers?
It can contaminate electronic equipment
48
What is a dry chemical fire suppression system?
A system dispersing fine powder to extinguish fires
49
What does a clean agent fire suppression system do?
Extinguishes fires by reducing heat removing oxygen or inhibiting chemical reactions
50
How can a laptop be physically secured?
Using a cable lock or placing it in a safe or vault
51
What is electromagnetic interference (EMI)?
Interference caused by electromagnetic fields emitted by electronic devices
52
What is the importance of physical security in network defense?
Prevents threat actors from physically accessing the network as well as remotely
53
What is a demilitarized zone (DMZ) in cybersecurity physical security?
A physical area separating threat actors from defenders to protect network assets