Module 2 Flashcards

Network Threats

1
Q

What is Risk Management?

A

The process of identifying, prioritizing, managing, and monitoring risks to information systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the common ways to manage risk?

A

Risk acceptance, risk reduction, and risk transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How is the term Hacker used?

A

To describe a threat actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

White hat hackers

A

Ethical hackers use their skills for good, ethical, and legal purposes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Grey hat hackers

A

Individuals who commit crimes and do unethical things, but not for personal gain or to cause damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Black hat hackers

A

Criminals who violate computer and network security for personal gain, or for malicious reasons, such as attacking networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the different types of threat actors?

A

Script kiddies, vulnerability brokers, hacktivists, cybercriminals, and state-sponsored hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How have attack tools developed?

A

They became more sophisticated and highly automated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some attack tools?

A

Password crackers, wireless hacking tools, network security scanning and hacking tools, packet crafting tools, packet sniffers, rootkit detectors, fuzzers to search vulnerabilities, forensic tools, debuggers, hacking operating systems, encryption tools, vulnerability exploration tools, and vulnerability scanners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the different categories of attacks?

A

eavesdropping attacks, data modification attacks, IP address spoofing attacks, password-based attacks, denial-of-service attacks, man-in-the-middle attacks, compromised key attacks, and sniffer attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why do threat actors try to trick users into installing malware?

A

To help exploit end-device vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Antimalware software cannot be updated quickly enough to stop new threats. (T/F)

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the three common types of malware?

A

Virus, worm, and Trojan horse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a virus?

A

A type of malware that spreads by inserting a copy of itself into another program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How do most viruses spread?

A

Through USB memory drives, CDs, DVDs, network shares, and email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Trojan horse?

A

A software that appears to be legitimate, but it contains malicious code that exploits the privileges of the user that runs it

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Where are Trojans often found?

A

In online games

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

How are Trojans classified?

A

According to the damage they cause

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the different types of Trojans?

A

Remote-access, data-sending, destructive, proxy, FTP, security software, disabler, DoS, and keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How are worms similar to viruses?

A

They replicate and can cause the same type of damage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What do Viruses need to run?

A

A host program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

How do worms run?

A

They can run by themselves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the three components worm attacks consist of?

A

Enabling vulnerability, propagation mechanism, and payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the most dominant malware currently?

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

How does ransomware work?

A

It denies access to the infected system or its data. The cybercriminals then demand payment to release the computer system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Other malware besides viruses, worms, and Trojan horse

A

Spyware, adware, scareware, phishing, and rootkits

27
Q

Three major categories of attacks from outside the network

A

Reconnaissance, access, and DoS attacks

28
Q

What is reconnaissance?

A

Information gathering. Threat actors do unauthorized discovery and mapping systems, services, or vulnerabilities

29
Q

Examples of using Reconnaissance before access or DoS attacks

A

Performing an information query of a target, initiating a ping sweep of the target network, initiating a port scan of active IP addresses, running vulnerability scanners, and running exploitation tools

30
Q

What do access attacks exploit?

A

Known vulnerabilities in authentication services, FTP services, and web services

31
Q

Access attacks

A

Password attacks, spoofing attacks, trust exploitation attacks, port redirections, man-in-the-middle attacks, and buffer overflow attacks

32
Q

How does access attack social engineering work?

A

Attempts to manipulate individuals into performing unsafe actions or divulging confidential information

33
Q

Social engineering attack methods

A

Pretexting, phishing, spear phishing, spam, something for something, baiting, impersonation, tailgating, shoulder surfing, and dumpster diving

34
Q

Two major DoS attacks

A

overwhelming quantity of traffic, and maliciously formatted packets

35
Q

What is the difference between DoS and DDoS attacks?

A

DDoS attacks increase in magnitude because they originate from multiple, coordinated sources

36
Q

What are the terms that describe DDoS attacks?

A

zombies, bots, botnet, handlers, and botmaster

37
Q

What is Mirai?

A

A malware that targets IoT devices configured with default login information

38
Q

What does Mirai do?

A

It uses a brute-force dictionary attack. After successful access, it targets the Linux-based BusyBox utilities that are designed for these devices

39
Q

What is the goal of a threat actor when using a buffer overflow DoS attack?

A

To find a system memory-related flaw on a server and exploit it

40
Q

What does overwhelming the buffer memory with unexpected values do to a system?

A

It renders it inoperable, creating a DoS attack

41
Q

Many attacks use stealthy evasion techniques to disguise an attack payload (T/F)

A

True

42
Q

Evasion methods

A

encrypting and tunneling, resource exhaustion, traffic fragmentation, protocol-level misinterpretation, traffic substitution, traffic insertion, pivoting rootkits, and proxies

43
Q

Attack surface

A

The total sum of vulnerabilities in a given system that are accessible to an attack. It also describes different points where an attacker could get into a system, and where they could get data out of the system

44
Q

Exploit

A

The mechanism that is used to leverage a vulnerability to compromise an asset. They could be remote and local.

45
Q

Remote Exploit

A

Works over the network without any prior access to the target system. The attacker does not need an account in the end system to exploit the vulnerability.

46
Q

Local Exploit

A

The threat actor has some type of user or administrative access to the end system. It does not necessarily mean that the attacker has physical access to the end system

47
Q

Risk

A

The likelihood that a particular threat will exploit a particular vulnerability of an asset and result in an undesirable consequence

48
Q

Risk acceptance

A

This is when the cost of risk management options outweighs the cost of the risk itself. The risk is accepted

49
Q

Risk avoidance

A

This means avoiding any exposure to the risk by eliminating the activity or device that presents the risk. By eliminating an activity to avoid risk, any benefits gained from the operation or activity that is at risk

50
Q

Risk reduction

A

Reduces exposure to risk or reducing the impact of risk by taking action to decrease the risk.

51
Q

What is the most commonly used mitigation strategy?

A

Risk reduction

52
Q

What does risk reduction require?

A

Careful evaluation of the costs of loss, the mitigation strategy, and the benefits gained from the operation or activity that is at risk

53
Q

Risk transfer

A

Some or all of the risk is transferred to a willing third party such as an insurance company

54
Q

Countermeasure

A

The actions that are taken to protect assets by mitigating a threat or reducing risk

55
Q

Impact

A

The potential damage to the organization that is caused by the threat

56
Q

Which exploit requires inside network access such as a user with an account on the network? Local or remote?

A

Local exploit

57
Q

What is a script kiddie?

A

Refers to teenagers or inexperienced threat actors running existing scripts, tools, and exploits, to cause harm, but typically not for profit

58
Q

What is a vulnerability broker?

A

Grey hat hackers who attempt to discover exploits and report them to vendors sometimes for prizes or rewards

59
Q

What are hacktivists?

A

Grey hat hackers who rally and protest against different political and social ideas. Hacktivists publicly protest against organizations or governments by posting articles, videos, leaking sensitive information, and performing distributed denial of service (DDoS) attacks

60
Q

What is a cybercriminal?

A

Black hat hackers who are either self-employed or working for large cybercrime organizations. Each year, cybercriminals are responsible for streaming billions of dollars from consumers and businesses

61
Q

What is a state-sponsored hacker?

A

Threat actors who steal government secrets, gather intelligence, and sabotage networks of foreign governments, terrorist groups, and corporations. Most countries in the world participate

62
Q

Where do cybercriminals operate?

A

In an underground economy where they buy, sell, and trade exploits and tools. They also buy and sell personal information and intellectual property that they steal from victims

63
Q

What do cybercriminals target?

A

Small businesses and consumers, as well as enterprises and industries