Security Threat Landscape Flashcards

1
Q

A Virus requires _________ to spread

A

Human interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Data Exfiltration

A

When data leaves an organization without authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Spoofing is where an attacker _____ their identity

A

fakes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ARP spoofing is a well know _____ _____ _____ ______ attack

A

man in the middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

False positive vs False negative

A

False positive - there is NO attack but triggers an alert
False negative - there IS an attack but doesn’t trigger an alert

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

IPS uses ____ to inspect packets. While Firewalls uses ____ to block traffic

A

signatures, rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Stateful Firewalls maintain a ______ ______ which tracks the two-way ‘state’ of traffic passing through the firewall

A

connection table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Packet Filters don’t _____ the state of two-way connections

A

track

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

For stateful firewalls, only ___ ___ is allowed back into the network

A

valid traffic (traffic already in the connection table)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are 3 symmetric encryption algorithms

A

DES, 3DES, and AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are 2 Asymmetric Encryption algorithms?

A

RSA and ECDSA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Hash-Based Message Authentication Codes (HMAC) provide what and uses what kind of encryption?

A

data integrity, symmetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are 2 HMAC algorithms?

A

MD5, SHA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How does Public Certificate Authorities verify certificate request?

A

Out-of-band checks before issuing legitimate certificates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

For IP sec, what is commonly used to protect against replay attackes

A

Encapsulating Security Payload (ESP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Remote Access VPN, how does full tunneling differ from split tunneling for internet traffic?

A

Full tunneling required you to go through the full tunnel then go to the internet web server.
Split can “split off” the tunnel and go straight to the web server