quiz Flashcards

1
Q

Subnet Spoofing

A

Generate random addresses within a given address space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Random Spoofing

A

Generate 32-bit numbers and stamp packets with them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fixed Spoofing

A

The spoofed address is the address of the target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Server Application DOS attack

A

The attack is targeted to a specific application on a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Network Access DOS attack

A

The attack is used to overload or crash the communication mechanism of a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Infrastructure DOS attack

A

The motivation of this attack is a crucial service of a global internet operation, for example core router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Random Scanning

A

Each compromised computer probes random addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Permutation Scanning

A

All compromised computers share a common pseudo-random permutation of the IP address space

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Signpost Scanning

A

Uses the communication patterns of the compromised computer to find new target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Hitlist Scanning

A

A portion of a list of targets is supplied to a compromised computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of these are the reasons why the UDP-based NTP protocol is particularly vulnerable to amplification attacks?

A

A small command can generate a large response.
Vulnerable to source IP spoofing.
It is difficult to ensure computers communicate only with legitimateNTP servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The server must reject all TCP options because the server discards the SYN queue entry. T or F?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

With regards to a UDP flood attack, which of the following statements are true

A

Attackers can spoof the IP address of their UDP packets. Firewalls cannot stop a flood because the firewall is susceptible to flooding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Client puzzles should be stateless. T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Puzzle complexity should increase as the strength of the attack increases. TF

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the folloiwing are assumptions that can be made about Traceback?

A

Attackers may work alone or in groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Select all the statements that are true for the edge sampling:

A

Multiple attackers can be identified since edge identifies splits in reverse path.
Requires space in IP packet header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Self defense against reflector attacks should incorporate:

A

Server redundancy- servers should be located in multiple networks and locations.
Traffic limiting - traffic from a name server should be limited to reasonable tresholds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Deep web

A

It is not indexed by standard search engines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Dark web

A

Web content that exists on darknets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Surface web

A

Readily available to the public, and searchable with standard search engines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Doorway pages

A

A webpage that lists many keywords, in hopes of increasing search engine ranking. Scripts on the page redirect to the attackers page.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Crypters

A

A program that hides malicious code from anti virus software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Blackhat search engine optimizer

A

It increases traffic to the attacker’s site by manipulating search engine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Trojan download manager
Software that allows an attacker to update or install malware on a victim's computer
26
What are the two defining characteristics of the internet spam?
Inappropriate or irrelevant | Large number of recipients
27
Name the top three countries where spam directed visitors added items to their shopping cart
US Canada Philippines
28
Which events should trigger a penetration test
Apps are addred or modified End user policies are changed Security patches are installed Infrastructure is added or modified
29
List the steps attackers use to access RSA adobe flash software
Identify employees are vulneralbe Craft an email subject line that entices an employee to open it Hide an executable file in the email that will install onto the victim's computer when email is opened
30
Flash or CD autoplay attack
A flash is created that has a program that creates a connection to the exploit server
31
Reverse shell applet attack
A signed JAVA applet is sent to the user, if they accept it, a shell is sent back to the exploit server
32
Click logger attack
Used to determine which users click on links in emails
33
Download connection attack
An email contains an attachment, when the attackment is downloaded an connection is made to the exploit server
34
ON the pie chart, what are the top 3 industries that were targets in 2016?
Defense contractor restaurant software
35
Tier one
A network can reach every other network through peering
36
Tier 2
A network that peers some of its network access and purchases some of it
37
Tier 3
A netowkr that purchases all transit from other networks
38
ip PROVIDES ONLY BEST EFFORT DELIVERY, ITS NOT GUARANTEED
True
39
Due the connectionless nature of IP, data corruption, packet loss, dupelication, and out of order delivery can occur
True
40
Network layer controls can protect data within the packets as well as the IP info for each packet
True
41
IP information cannot be protected by transport layer controls
True
42
Address resolution protocol (ARP)
Protocol designed to map IP network addresses to the hardware address used by a data link protocol
43
Open shortest path first (OSPF)
protocol uses a link state routing algorithm and falls into the group of interior routing protocols
44
Border gateway protocol (BGP)
protocol designed to exchange routing and reachability information among autonomous system(AS)
45
Denial of service
Create a false route or kill a legitimate one
46
Sniffing
The attacker must control a device along the victim's commuinication path
47
Routing to endpoints in malicious networks
The first step is to hijack traffic from a legitimate host
48
Creating route instabilities
Not yet used by hackers because damage cannot be contained. it can blockback to the attacker
49
Revelation of network topologies
Unmasking the AS relationships by hacking the routing table
50
Domain name
A name in the DNS format
51
DNS zone
A set of names under the same authority (ie ".com")
52
Delegation
Transfer of authority for/to a subdomain
53
changing a domain name into an IP address involves a large number of steps. To save time, the records are <> on a local server for reuse later
Cached
54
Each record hs a <> that states how long a record can be kept for future use
TTL
55
All domain names and IP addresses are stored at the central registry
True
56
It can take several days for information to propagete to all DNS servers
TRUE
57
The attacker's server responds with a short TTL record, the attacker needs to register a domain and delegate it to a server under his control. The attacker exploits the smae origin policy
True
58
Using components with known vulnerabilities
Uses unpatched third party components
59
Missing function level access control
Privileage functionality is hidden rather than enforced through access controls
60
Sensitive data exposure
Abuses lack of data encryption
61
Insecure direct object references
Attacker modify file names
62
Security misconfiguration
exploits misconfigured servers
63
cross site scripting
insert javascript into trusted sites
64
Broken authentication and session
program flaws allow bypass of authentication methods
65
Injection
modifies back end statement through user input
66
Given the list of attributes, which 2 should not be combined? put a check next to the 2 attributes that should not be combined in sandbox
allow same origin | allow scripts
67
CSP will allow third party widgets( eg Google +1 button) to be embedded on your site
True
68
If you have thrid party forum software that has inline script, CSP cannot be used
False
69
CORS allows cross-domain communication from the brwoser | CORS requires coordination between server and client
True
70
CORS is not widely supported by browsers | The cors header can be used to secure resources on a website
false
71
The token must be stored somewhere | Tokens expire, but there should be mechanisms to revoke them if necessary
true
72
Active session hijacking involves disconnecting the user from the server once that user is logged on. Social engineering is required to perform this type of hijacking
true
73
Select all the items that can be encrypted by HTTPS
Request URL Query paramaters Headers Cookies
74
Which of the following are real disadvantages to useing HTTPS
You need to buy an SSL cert Mixed modes issue-loading insecure content on a secure site proxy cahcing problems - prublic caching cannot occur
75
According to Wikipedia, which of these devices is a mobile device
Smart phone held by person Self driving car robot
76
list 4 areas of the C based toolchain where ahrdening can occur
Configuration Preprocessor Compiler Linker
77
Which of these behaviors are indiciative of botnets
Linking to an extablished C&C server Generating Internet relay chat (IRC) traffic using specific range of ports Generating SMTP emails /traffic Reducing/ Generating simultaneous identical DNS requests is suspicious
78
what can botnets to evade C-plane clustering
``` Manipulate communication patterns. Introduce noise (in the form of random packets) to reduce similarity between C&C flows ```
79
What can botnets do to evade A plane monitoring
Perform slow spamming | Use undetectable activities (spam sent with Gmail, download exe from https server)
80
Which of the information should be considered in order to identify the source (perp) of an APT attack?
Source IP address of TCP-based attack packets Coding syle of malware Inclusion of special libraries with known authors motives of the attack language encoding
81
Footprinting (FP)
The attacker gathers information about a target. | The kind of information gathered is DNS, email, servers, and the IP address range
82
Scanning (S)
The attacker uses the internet ot obtain information on specific IP addresses. The kind of information gathered is OS, Services, and architecture of the target system
83
Enumeration (E)
The attacker gathers information on the network user and group names, routing tables, and simple network management protocol.
84
Which protocl is used to break data into packets? which protocol reassembles the data packets?
TCP
85
Which protocol is used to mobve packets from router to router
IP
86
why does ZMap find more hosts than nmap
Statelessness leads to both higher performance and increased coverage
87
With regard to computing, what is entropy?
Randomness for use in cryptgraphy or other applications that require random data
88
what are the two sources of entropy?
Hardware sources and randomness generators.
89
A lack of entropy will have a negative impact on performance and security
True
90
NoBL DNSBL level
This IP address does not send spam, and should not be blacklisted. But it is not fully trustworty
91
GREY DNSBL level
This ip address is not directly involved in spamming but is associated with spam like behaviours
92
Yellow DNSBL level
THis ip address is known to produce spam and non spam email
93
Botnets
Short lived domains
94
Spyware
Anonymously registered domains
95
Adware
Disposable domains
96
List the types of characters a malicuious domain name detection program should look in for a domain name
Number of characters, hyphens, digits
97
Network based features
Quantities such as the total nubmer of IPs historically assicoated with the diversity of their geographical locations, the number of distinct autonomous systems