Module 2 Flashcards

1
Q

are anything of value to an organization, such as data and other intellectual property, servers, computers, smart phones, tablets, and more.

A

Assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A potential danger to an asset such as data or the network itself.

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A weakness in a system or its design that could be exploited by a threat.

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An attack surface is the total sum of the vulnerabilities in a given system that are accessible to an attacker. The attack surface describes different points where an attacker could get into a system, and where they could get data out of the system. For example, your operating system and web browser could both need security patches. They are each vulnerable to attacks and are exposed on the network or the internet. Together, they create an attack surface that the threat actor can exploit.

A

Attack surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The mechanism that is used to leverage a vulnerability to compromise an asset. Exploits may be remote or local. A remote exploit is one that works over the network without any prior access to the target system. The attacker does not need an account in the end system to exploit the vulnerability. In a local exploit, the threat actor has some type of user or administrative access to the end system. A local exploit does not necessarily mean that the attacker has physical access to the end system.

A

Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The likelihood that a particular threat will exploit a particular vulnerability of an asset and result in an undesirable consequence.

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

is the process that balances the operational costs of providing protective measures with the gains achieved by protecting the asset.

A

Risk management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

There are four common ways to manage risk (Risk Management Strategy)

A

Risk acceptance
Risk avoidance
Risk reduction
Risk transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This is when the cost of risk management options outweighs the cost of the risk itself. The risk is accepted, and no action is taken.

A

Risk acceptance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This means avoiding any exposure to the risk by eliminating the activity or device that presents the risk. By eliminating an activity to avoid risk, any benefits that are possible from the activity are also lost.

A

Risk avoidance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This reduces exposure to risk or reducing the impact of risk by taking action to decrease the risk. It is the most commonly used risk mitigation strategy. This strategy requires careful evaluation of the costs of loss, the mitigation strategy, and the benefits gained from the operation or activity that is at risk.

A

Risk reduction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Some or all of the risk is transferred to a willing third party such as an insurance company.

A

Risk transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The actions that are taken to protect assets by mitigating a threat or reducing risk.

A

Countermeasure -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The potential damage to the organization that is caused by the threat.

A

Impact -

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

requires inside network access such as a user with an account on the network.

A

A local exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

does not require an account on the network to exploit that network’s vulnerability.

A

A remote exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

is a common term used to describe a threat actor.

A

hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A clever programmer capable of developing new programs and coding changes to existing programs to make them more efficient.

A network professional that uses sophisticated programming skills to ensure that networks are not vulnerable to attack.

A person who tries to gain unauthorized access to devices on the internet.

An individual who run programs to prevent or slow network access to a large number of users, or corrupt or wipe out data on servers.

A

Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

are ethical hackers who use their programming skills for good, ethical, and legal purposes. They may perform network penetration tests in an attempt to compromise networks and systems by using their knowledge of computer security systems to discover network vulnerabilities. Security vulnerabilities are reported to developers and security personnel who attempt to fix the vulnerability before it can be exploited. Some organizations award prizes or bounties to ____ when they provide information that helps to identify vulnerabilities.

A

White hat hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

are individuals who commit crimes and do arguably unethical things, but not for personal gain or to cause damage. An example would be someone who compromises a network without permission and then discloses the vulnerability publicly. ___ may disclose a vulnerability to the affected organization after having compromised their network. This allows the organization to fix the problem.

A

Grey hat hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

are unethical criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks. __ hackers exploit vulnerabilities to compromise computer and network systems.

A

Black hat hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

emerged in the 1990s. They are teenagers or inexperienced threat actors
running existing scripts, tools, and exploits, to cause harm, but typically not for profit.

A

Script Kiddies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

are grey hat hackers who attempt to discover exploits and report them
to vendors, sometimes for prizes or rewards.

A

Vulnerability Brokers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

are grey hat hackers who rally and protest against different political and social
ideas.

A

Hacktivists

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

is a term for black hat hackers who are either self‐employed or working for
large cybercrime organizations.

A

Cybercriminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

are threat actors who steal government secrets, gather intelligence,
and sabotage networks of foreign governments, terrorist groups, and corporations.

A

State‐ Sponsored hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Since hacking started in the 1960s with ____ it has evolved to
include many types of threat actors.

A

phone freaking, or phreaking,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

are threat actors
who are motivated to make money
using any means necessary.

A

Cybercriminals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Cybersecurity tasks

A
  • Use a trustworthy IT vendor
  • Keep security software up-to-date
  • Perform regular penetration tests
  • Back up to cloud and hard disk
  • Periodically change WIFI password
  • Keep security policy up-to-date
  • Enforce use of strong passwords
  • Use two factor authentication
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Many network attacks can be prevented by sharing information about ____ Each attack has unique, identifiable attributes.

A

indicators of compromise
(IOC).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

___ are the evidence
that an attack has occurred.

A

Indicators of compromise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

IOCs can be features that identify the following:

A
  • malware files
  • IP addresses of servers that are used in attacks
  • filenames
  • characteristic changes made to end system software
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

___ focus more on the motivation behind an attack and the potential means by which threat actors have, or will, compromise vulnerabilities to gain access to assets.

A

Indicators of attack (IOA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

are concerned with the strategies that are used by attackers.

A

Indicators of attack (IOA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Categories of Tools / Evolution of Security Tools

A

password crackers
wireless hacking tools
network scanning and hacking tools
packet crafting tools
packet sniffers
rootkit detectors
fuzzers to search vulnerabilities
forensic tools
debuggers
hacking operating systems
encryption tools
vulnerability exploitation tools
vulnerability scanners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Passwords are the most vulnerable security threat. ____ are often referred to as password recovery tools and can be used to crack or recover the password. This is accomplished either by removing the original password, after bypassing the data encryption, or by outright discovery of the password. ____ repeatedly make guesses in order to crack the password and access the system.

A

password crackers

Examples of password cracking tools include John the Ripper, Ophcrack, L0phtCrack, THC Hydra, RainbowCrack, and Medusa.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Wireless networks are more susceptible to network security threats. ____ are used to intentionally hack into a wireless network to detect security vulnerabilities.

A

wireless hacking tools

Examples of wireless hacking tools include Aircrack-ng, Kismet, InSSIDer, KisMAC, Firesheep, and NetStumbler.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

____ are used to probe network devices, servers, and hosts for open TCP or UDP ports.

A

network scanning and hacking tools

Examples of scanning tools include Nmap, SuperScan, Angry IP Scanner, and NetScanTools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

____ _are used to probe and test a firewall’s robustness using specially crafted forged packets.

A

packet crafting tools

Examples of such tools include Hping, Scapy, Socat, Yersinia, Netcat, Nping, and Nemesis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

_______ are used to capture and analyze packets within traditional Ethernet LANs or WLANs.

A

packet sniffers

Tools include Wireshark, Tcpdump, Ettercap, Dsniff, EtherApe, Paros, Fiddler, Ratproxy, and SSLstrip.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

_____ is a directory and file integrity checker used by white hats to detect installed root kits.

A

rootkit detectors

Example tools include AIDE, Netfilter, and PF: OpenBSD Packet Filter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

____are tools used by threat actors when attempting to discover a computer system’s security vulnerabilities.

A

fuzzers to search vulnerabilities

Examples of fuzzers include Skipfish, Wapiti, and W3af.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

White hat hackers use _____ to sniff out any trace of evidence existing in a particular computer system.

A

forensic tools

Example of tools include Sleuth Kit, Helix, Maltego, and Encase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

_____ are used by black hats to reverse engineer binary files when writing exploits. They are also used by white hats when analyzing malware.

A

debuggers

Debugging tools include GDB, WinDbg, IDA Pro, and Immunity Debugger.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

_____ are specially designed operating systems preloaded with tools and technologies optimized for hacking.

A

hacking operating systems

Examples of specially designed hacking operating systems include Kali Linux, SELinux, Knoppix, Parrot OS, and BackBox Linux.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

These tools safeguard the contents of an organization’s data when it is stored or transmitted. ______use algorithm schemes to encode the data to prevent unauthorized access to the data.

A

encryption tools

Examples of these tools include VeraCrypt, CipherShed, Open SSH, OpenSSL, OpenVPN, and Stunnel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

These tools identify whether a remote host is vulnerable to a security attack.

A

vulnerability exploitation tools

Examples of vulnerability exploitation tools include Metasploit, Core Impact, Sqlmap, Social Engineer Tool Kit, and Netsparker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

These tools scan a network or system to identify open ports. They can also be used to scan for known vulnerabilities and scan VMs, BYOD devices, and client databases.

A

vulnerability scanners

Examples of these tools include Nipper, Securia PSI, Core Impact, Nessus, SAINT, and Open VAS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Categories of Attacks

A

eavesdropping attacks
data modification attack
IP address spoofing attack
password-based attacks
denial-of-service (DoS) attack
man-in-the-middle attack (MiTM)
compromised key attack
sniffer attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

is when a threat actor captures and listens to network traffic. This attack is also referred to as sniffing or snooping.

A

eavesdropping attack

or sniffing or snooping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

occur when a threat actor has captured enterprise traffic and has altered the data in the packets without the knowledge of the sender or receiver.

A

Data modification attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

is when a threat actor constructs an IP packet that appears to originate from a valid address inside the corporate intranet.

A

IP address spoofing attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

occur when a threat actor obtains the credentials for a valid user account. Threat actors then use that account to obtain lists of other users and network information. They could also change server and network configurations, and modify, reroute, or delete data.

A

Password-based attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

prevents normal use of a computer or network by valid users. After gaining access to a network,

a _____can crash applications or network services.

A ___ _can also flood a computer or the entire network with traffic until a shutdown occurs because of the overload.

A _____can also block traffic, which results in a loss of access to network resources by authorized users.

A

denial-of-service DoS attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

occurs when threat actors have positioned themselves between a source and destination. They can now actively monitor, capture, and control the communication transparently.

A

man-in-the-middle attack MiTM attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

occurs when a threat actor obtains a secret key. This is referred to as a compromised key. A compromised key can be used to gain access to a secured communication without the sender or receiver being aware of the attack.

A

compromised-key attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

is an application or device that can read, monitor, and capture network data exchanges and read network packets. If the packets are not encrypted, a ____ provides a full view of the data inside the packet. Even encapsulated (tunneled) packets can be broken open and read unless they are encrypted and the threat actor does not have access to the key.

A

sniffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

can occur when threat actors have gained access to user account information that allows them to access a system like authorized users.

A

A password-based attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

threat actors alter the contents of legitimate messages without the knowledge of the sender or receiver.

A

In data modification attacks,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

a threat actor causes network traffic to pass through his computer. The traffic is then forwarded on as usual. The threat actor can then access then read and analyze the traffic for valuable information.

A

In man-in-the-middle (MiTM) attacks,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

When encryption keys are stolen and use to decrypt private communications, ____ has occurred.

A

a compromised-key attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

A threat actor has attached to the network and uses a sniffer to read the contents of network traffic. This is an _____

A

eavesdropping attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

A threat actor uses a tool to construct IP packets that appear to come from a valid source within the corporate network. This is an example of

A

IP address spoofing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

uses fake traffic to prevent legitimate users to access a network or system.

A

A denial of service (DoS) attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

It is code or software that is specifically
designed to damage, disrupt, steal, or generally inflict some other “bad” or illegitimate action on
data, hosts, or networks.

A

Malware is short for malicious software or malicious code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

are especially prone to malware attacks.

A

End devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Three most common types of malware are:

A
  • virus
  • worm
  • Trojan horse
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

is a type of malware that spreads by inserting a copy of itself into another program. After
the program is run, ____ then spread from one computer to another, infecting the computers.

Most ____ require human help to spread.

A simple ___ may install itself at the first line of code in an executable file. When activated, the
___ might check the disk for other executables so that it can infect all the files it has not yet
infected.

___ can also be programmed to mutate to avoid detection.

Most____ are now spread by
USB memory drives,
CDs,
DVDs,
network shares, and
email.

A

A virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

is software that appears to be legitimate, but it contains malicious code which exploits the privileges of the user who runs it.

Often, ___are found attached to online games.

The ____concept is flexible. It can cause immediate damage, provide remote access to
the system, or access through a back door. It can also perform actions as instructed remotely,
such as “send me the password file once per week.”

A

Trojan horse malware

68
Q

Trojan Horse Classification / Type of Trojan Horse

A

remote-access
data-sending
destructive
proxy
FTP
Security software disabler
Denial of Service (DoS)
Keylogger

69
Q

Enables unauthorized remote access.

A

Remote-access

69
Q

Provides the threat actor with sensitive data, such as passwords.

A

Data-sending

70
Q

Corrupts or deletes files.

A

Destructive

71
Q

Uses the victim’s computer as the source device to launch attacks and perform other illegal activities.

A

Proxy

72
Q

Enables unauthorized file transfer services on end devices.

A

FTP

73
Q

Stops antivirus programs or firewalls from functioning.

A

Security software disabler

74
Q

Slows or halts network activity.

A

Denial of Service (DoS)

75
Q

Actively attempts to steal confidential information, such as credit card numbers, by recording keystrokes entered into a web form.

A

Keylogger

76
Q

are like viruses because they replicate and can cause the same type of damage.

Specifically, ____ replicate themselves by independently exploiting vulnerabilities in networks.

_____ can slow down networks as they spread from system to system.

A

Computer worms

77
Q

____ known as the worm that ate the internet, was a denial of service (DoS) attack that
exploited a buffer overflow bug in Microsoft’s SQL Server. At its peak, the number of infected
servers doubled in size every 8.5 seconds. It infected 250,000+ hosts within 30 minutes, as shown
in the figure.

A

SQL Slammer,

78
Q

Most worm attacks consist of three components,

A

Enabling vulnerability
Propagation mechanism
Payload

79
Q

A worm installs itself using an exploit mechanism, such as an email attachment, an executable file, or a Trojan horse, on a vulnerable system.

A

Enabling vulnerability

80
Q

After gaining access to a device, the worm replicates itself and locates new targets.

A

Propagation mechanism

81
Q

Any malicious code that results in some action is a payload. Most often this is used to create a backdoor that allows a threat actor access to the infected host or to create a DoS attack.

A

Payload

82
Q

are self-contained programs that attack a system to exploit a known vulnerability. Upon successful exploitation, the ____ copies itself from the attacking host to the newly exploited system and the cycle begins again. Their propagation mechanisms are commonly deployed in a way that is difficult to detect.

A

Worms

83
Q

Code Red Worm Propagation

A
  1. Propagate for 19 days
  2. Launch Dos attack for next 7 days
  3. Stop and go dormant for a few days
  4. Repeat the cycle
84
Q

Currently, the most dominant malware is ____.
* ____ is malware that denies access to the infected computer system or its data. The cybercriminals then demand payment to release the computer system.
* ____ has evolved to become the most profitable malware type in history.
* There are dozens of ___ _variants.
* _____ frequently uses an encryption algorithm to encrypt system files and data.
* Payments are typically paid in Bitcoin because users of bitcoin can remain anonymous.
* Email and malicious advertising, also known as malvertising, are vectors for ____ campaigns.
* Social engineering is also used.

A

ransomware

85
Q

Other Malware, / type of malware

A

spyware
adware
scareware
phishing
rootkits

86
Q

Used to gather information about a user and send the information to another entity without the user’s consent. ____ can be a system monitor, Trojan horse, Adware, tracking cookies, and key loggers.

A

Spyware

87
Q

Displays annoying pop-ups to generate revenue for its author. The malware may analyze user interests by tracking the websites visited. It can then send pop-up advertising pertinent to those sites.

A

Adware

88
Q

Includes scam software which uses social engineering to shock or induce anxiety by creating the perception of a threat. It is generally directed at an unsuspecting user and attempts to persuade the user to infect a computer by taking action to address the bogus threat.

A

Scareware

89
Q

Attempts to convince people to divulge sensitive information. Examples include receiving an email from their bank asking users to divulge their account and PIN numbers.

A

Phishing

90
Q

Installed on a compromised system. After it is installed, it continues to hide its intrusion and provide privileged access to the threat actor.

A

Rootkits

91
Q

Common Malware Behaviors

A

Appearance of strange files, programs, or desktop icons

Antivirus and firewall programs are turning off or reconfiguring settings

Computer screen is freezing or system is crashing

Emails are spontaneously being sent without your knowledge to your contact list

Files have been modified or deleted

Increased CPU and/or memory usage

Problems connecting to networks

Slow computer or web browser speeds

Unknown processes or services running

Unknown TCP or UDP ports open

Connections are made to hosts on the Internet without user action

Strange computer behavior

92
Q

replicate by sending copies of themselves across the network to other hosts.

A

Worms

93
Q

causes messages to appear that direct the user to purchase a product or visit a commercial website.

A

Adware

94
Q

malware masquerades as a legitimate request for personal information, but actually sends that information to threat actors.

A

Phishing

95
Q

will prevent access to computer systems, sometimes by encrypting device storage. Payment needs to be made to regain access to the system.

A

Ransomware

96
Q

What type of malware executes arbitrary code and installs copies of itself in the memory of the infected computer? The main purpose of this malware is to automatically replicate from system to system across the network.

A

Worm

97
Q

What type of malware attempts to convince people to divulge their personally identifiable information (PII)?

A

Phishing

98
Q

Types of Network Attacks / classifies attacks in three major categories.

A

Reconnaissance Attacks
Access Attacks
DoS Attacks

99
Q

is information gathering. Threat actors use reconnaissance (or recon) attacks to do unauthorized discovery and mapping of systems, services, or vulnerabilities. Recon attacks precede access attacks or DoS attacks. Some of the techniques used by malicious threat actors to conduct
reconnaissance attacks are described in the table.

A

Reconnaissance attacks

100
Q

The threat actor is looking for initial information about a target. Various tools can be used, including the Google search, organizations website, whois, and more.

A

Perform an information query of a target

101
Q

The information query usually reveals the target’s network address. The threat actor can now initiate a ping sweep to determine which IP addresses are active.

A

Initiate a ping sweep of the target network

102
Q

This is used to determine which ports or services are available. Examples of port scanners include Nmap, SuperScan, Angry IP Scanner, and NetScanTools.

A

Initiate a port scan of active IP addresses

103
Q

This is to query the identified ports to determine the type and version of the application and operating system that is running on the host. Examples of tools include Nipper, Secuna PSI, Core Impact, Nessus v6, SAINT, and Open VAS.

A

Run vulnerability scanners

104
Q

The threat actor now attempts to discover vulnerable services that can be exploited. A variety of vulnerability exploitation tools exist including Metasploit, Core Impact, Sqlmap, Social Engineer Toolkit, and Netsparker.

A

Run exploitation tools

105
Q

progress of a reconnaissance attack

A

from information query, to ping sweep, to port scan.

106
Q

exploit known vulnerabilities in authentication services, FTP services, and web services. The purpose of this type of attack is to gain entry to web accounts,
confidential databases, and other sensitive information.

A

Access attacks

107
Q

the threat actor attempts to discover critical system passwords using various
methods.

A

Password Attacks

108
Q

the threat actor’s device attempts to pose as another device by falsifying data.
Common spoofing attacks include IP spoofing, MAC spoofing, and DHCP spoofing.

A

Spoofing Attacks

109
Q

a threat actor uses unauthorized privileges to gain access to
a system, possibly compromising the target.

A

Trust Exploitation

110
Q

a threat actor uses a compromised system as a base for attacks against other targets.

A

Port redirection

111
Q

the threat actor is positioned in between two legitimate entities in order to read or modify the data that passes between the two parties.

A

Man-in-the-Middle

112
Q

the threat actor exploits the buffer memory and overwhelms it with unexpected values. This usually renders the system inoperable, resulting in a DoS attack.

A

Buffer Overflow Attack

113
Q

is an access attack that attempts to manipulate individuals into performing actions or divulging confidential information.

A

Social engineering

114
Q

A threat actor pretends to need personal or financial data to confirm the identity of the recipient.

A

Pretexting

115
Q

A threat actor sends fraudulent email which is disguised as being from a legitimate, trusted source to trick the recipient into installing malware on their device, or to share personal or financial information.

A

Phishing

116
Q

A threat actor creates a targeted phishing attack tailored for a specific individual or organization.

A

Spear phishing

117
Q

Also known as junk mail, this is unsolicited email which often contains harmful links, malware, or deceptive content.

A

Spam

118
Q

Sometimes called “Quid pro quo”, this is when a threat actor requests personal information from a party in exchange for something such as a gift.

A

Something for Something

119
Q

A threat actor leaves a malware infected flash drive in a public location. A victim finds the drive and unsuspectingly inserts it into their laptop, unintentionally installing malware.

A

Baiting

120
Q

In this type of attack, a threat actor pretends to be someone else to gain the trust of a victim.

A

Impersonation

121
Q

This is where a threat actor quickly follows an authorized person into a secure location to gain access to a secure area.

A

Tailgating

122
Q

This is where a threat actor inconspicuously looks over someone’s shoulder to steal their passwords or other information.

A

Shoulder surfing

123
Q

This is where a threat actor rummages through trash bins to discover confidential documents.

A

Dumpster diving

124
Q

was designed to help white hat hackers and other network security professionals create social engineering attacks to test their own networks. It is a set of menu-based tools that help launch social engineering attacks.

A

The Social Engineer Toolkit (SET)

125
Q

Recommended Social Engineering Protection Practices / Protecting against social engineering attacks

A

Never give your username / password credentials to anyone
Never leave your username / password credentials where they can easily be found
Never open emails from untrusted sources
Never release work related information on social media sites
Never re-use work related passwords
Always lock or sign out of your computer when unattended
Always report suspicious individuals
Always destroy confidential information according to the organization policy

126
Q

The weakest link in cybersecurity can be the ___ organization, and social engineering a major security threat. Because of this, one of the most effective security measures that an organization can take is to train its personnel and create a “security-aware culture.”

A

personnel

127
Q

A ____ creates some sort of interruption of network services to users, devices, or applications.

A

Denial of Service (DoS) attack

128
Q

There are two major types of DoS attacks:

A

Overwhelming Quantity of Traffic
Maliciously Formatted Packets

129
Q

The threat actor sends an enormous quantity of data at a rate that the network, host, or application cannot handle. This causes transmission and response times to slow down. It can also crash a device or service.

A

Overwhelming Quantity of Traffic

130
Q

The threat actor sends a maliciously formatted packet to a host or application and the receiver is unable to handle it. This causes the receiving device to run very slowly or crash.

A

Maliciously Formatted Packets

131
Q

are a major risk because they interrupt communication and cause significant loss of time and money. These attacks are relatively simple to conduct, even by an unskilled threat actor.

A

DoS attacks

132
Q

____ it originates from multiple, coordinated sources. For example, A threat actor builds a network of infected hosts, known as zombies. The threat actor uses a command and control (CnC) system to send control messages to the zombies. The zombies constantly scan and infect more hosts with bot malware. The bot malware is designed to infect a host, making it a zombie that can communicate with the CnC system. The collection of zombies is called a botnet. When ready, the threat actor instructs the CnC system to make the botnet of zombies carry out a DDoS attack.

A

A Distributed DoS Attack (DDoS) is similar to a DoS attack,

133
Q

attack increases in magnitude because it originates from multiple, coordinated sources, as shown in the figure.

A

DDoS attacks are similar in intent to DoS attacks, except that a DDoS

134
Q

Components of DDoS

A

zombies
bots
botnet
handlers
botmasters

135
Q

This refers to a group of compromised hosts (i.e., agents). These hosts run malicious code referred to as robots (i.e., bots). The zombie malware continually attempts to self-propagate like a worm.

A

zombies

136
Q

Bots are malware that is designed to infect a host and communicate with a handler system. Bots can also log keystrokes, gather passwords, capture and analyze packets, and more.

A

bots

137
Q

This refers to a group of zombies that have been infected using self-propagating malware (i.e., bots) and are controlled by handlers.

A

botnet

138
Q

This refers to a primary command-and-control (CnC or C2) server controlling groups of zombies. The originator of a botnet can use Internet Relay Chat (IRC) or a web server on the C2 server to remotely control the zombies.

A

handlers

139
Q

This is the threat actor who is in control of the botnet and handlers.

A

botmaster

140
Q

The goal of a threat actor when using a ____ is to find a system memory related flaw on a server and exploit it. Exploiting the buffer memory by overwhelming it with
unexpected values usually renders the system
inoperable, creating a DoS attack.
It is estimated that one third of malicious attacks
are the result of ____

A

buffer overflow DoS attack

141
Q

An early example of using malformed packets was the ____. In this legacy attack, the threat actor sent a ____, which was an echo request in an IP packet larger than the maximum packet size of 65,535 bytes. The receiving host would not be able to handle a packet of that size and it would crash.

A

Ping of Death.

142
Q

evasion methods used by threat actors (to hide is to thrive)

A

encryption and tunneling
resource exhaustion
traffic fragmentation
protocol-level misinterpretation
traffic substitution
traffic insertion
pivoting
rootkits
proxies

143
Q

This evasion technique uses tunneling to hide, or encryption to scramble, malware files. This makes it difficult for many security detection techniques to detect and identify the malware. Tunneling can mean hiding stolen data inside of legitimate packets.

A

Encryption and tunneling

144
Q

This evasion technique makes the target host too busy to properly use security detection techniques.

A

Resource exhaustion

144
Q

This evasion technique splits a malicious payload into smaller packets to bypass network security detection. After the fragmented packets bypass the security detection system, the malware is reassembled and may begin sending sensitive data out of the network.

A

Traffic fragmentation

145
Q

This evasion technique occurs when network defenses do not properly handle features of a PDU like a checksum or TTL value. This can trick a firewall into ignoring packets that it should check.

A

Protocol-level misinterpretation

146
Q

In this evasion technique, the threat actor attempts to trick an IPS by obfuscating the data in the payload. This is done by encoding it in a different format. For example, the threat actor could use encoded traffic in Unicode instead of ASCII. The IPS does not recognize the true meaning of the data, but the target end system can read the data.

A

Traffic substitution

147
Q

Similar to traffic substitution, but the threat actor inserts extra bytes of data in a malicious sequence of data. The IPS rules miss the malicious data, accepting the full sequence of data.

A

Traffic insertion

148
Q

This technique assumes the threat actor has compromised an inside host and wants to expand their access further into the compromised network. An example is a threat actor who has gained access to the administrator password on a compromised host and is attempting to login to another host using the same credentials.

A

Pivoting

149
Q

A ____ is a complex attacker tool used by experienced threat actors. It integrates with the lowest levels of the operating system. When a program attempts to list files, processes, or network connections, the ____ presents a sanitized version of the output, eliminating any incriminating output. The goal of the ____ is to completely hide the activities of the attacker on the local system.

A

Rootkits

150
Q

Network traffic can be redirected through intermediate systems in order to hide the ultimate destination for stolen data. In this way, known command-and-control not be blocked by an enterprise because the proxy destination appears benign. Additionally, if data is being stolen, the destination for the stolen data can be distributed among many proxies, thus not drawing attention to the fact that a single unknown destination is serving as the destination for large amounts of network traffic.

A

Proxies

151
Q

is an access attack in which the threat actor is positioned between legitimate entities in order to read or modify the data that passes between them.

A

Man-in-the-Middle

152
Q

is a social engineering attack where a threat actor quickly follows an authorized person into a secure location by taking advantage of the authorized person’s credentials.

A

Tailgating

153
Q

is a reconnaissance attack in which a threat actor uses a tool like Nmap to scan for open TCP or UDP ports on active devices in a network.

A

Port scanning

154
Q

In any organization,___ can be weakest link in network security. ___ fall victim to social engineering attacks, open file attachments that contain malware, or use insecure passwords, for example.

A

people

155
Q

are infected computers that make up a botnet. The ____ are used to deploy a distributed denial of service (DDoS) attack.

A

Zombies

156
Q

Vulnerability exploits may be remote or local. In a local exploit, the threat actor has some type of user access to the end system, either physically or through remote access. The exploitation activity is within the local network.

A

a threat actor tries to gain the user password of a remote host by using a keyboard capture software installed on it by a trojan

157
Q

An access attack tries to gain access to a resource using a hijacked account or other means. The five types of access attacks include the following:

A

password - a dictionary is used for repeated login attempts
trust exploitation - uses granted privileges to access unauthorized material
port redirection - uses a compromised internal host to pass traffic through a firewall
man-in-the-middle - an unauthorized device positioned between two legitimate devices in order to redirect or capture traffic
buffer overflow - too much data sent to a memory location that already contains data

158
Q

Hackers use rootkits to avoid detection as well as hide any software installed by the hacker.

A

to gain access to a device without being detected

159
Q

is the total sum of the vulnerabilities in a system that is accessible to an attacker. The attack surface can consist of open ports on servers or hosts, software that runs on Internet-facing servers, wireless network protocols, and even users.

A

An attack surface

160
Q

Which risk management plan involves discontinuing an activity that creates a risk?

A

During a risk assessment it may be determined that an activity involves more risk than benefit. In such a situation an organization may decide to avoid the risk altogether by discontinuing the activity. This is known as risk avoidance.

161
Q

Script kiddies is a term used to describe inexperienced hackers.

A

amateur hacker

162
Q

What is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source?

is used by malicious parties who create fraudulent messages that attempt to trick a user into either sharing sensitive information or installing malware.

A

Phishing

163
Q

Worms are self-replicating pieces of software that consume bandwidth on a network as they propagate from system to system. They do not require a host application, unlike a virus. Viruses, on the other hand, carry executable malicious code which harms the target machine on which they reside.

A

worm is self-replicating
worm travels to new computers without any intervention or knowledge of the user

164
Q

Social engineering attempts to gain the confidence of an employee and convince that person to divulge confidential and sensitive information, such as usernames and passwords. DDoS attacks, spam, and keylogging are all examples of software based security threats, not social engineering.

A

A user receives a phone call from a person who claims to represent IT services and then asks that user for confirmation of username and password for auditing purposes.

165
Q

Which evasion method describes the situation that after gaining access to the administrator password on a compromised host, a threat actor is attempting to login to another host using the same credentials?

is an evasion method that assumes the threat actor has compromised an inside host and the actor wants to expand the access further into the compromised network.

A

Pivoting

166
Q

the goal of the attacker is to prevent legitimate users from accessing network services.

A

In a DoS or denial-of-service attack,