Threat & Vulnerabilities Flashcards

1
Q

Person or event with the potential to have an impact on a valuable resource

A

Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Flaw or weakness within a system that can be exploited. Quality within a resource or its environment that might allow a threat to be realized

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The likelihood of a threat exploiting a vulnerability

A

Risk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Act of protecting data and information from unauthorized access, unlawful modification and disruption, disclosure, and corruption, and destruction

A

Information Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Threat that originates within the organization

A

Internal / Insider Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The act of protecting the systems that hold and process critical data, the device holding the data

A

Information System Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CIA Triad

A

Confidentiality
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Threats that are external to an organization

A

External Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

List of publicly disclosed computer security weaknesses

A

CVE (Common Vulnerabilities and Exposure)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Vulnerability that is discovered or exploited before the vendor can issue a patch to fix it

A

Zero-day vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Software code that takes advantage of a security flaw or vulnerability

A

Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Confidentiality protections such as looked doors, fences, security guards, security cameras, and safes are examples of what type of protection?

A

Physical protections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Confidentiality protections such as encryption, passwords, firewalls, and MFA are examples of what type of protection?

A

Electronic protections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

2 best methods for integrity

A

1) Hashing
2) Checksums

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A file that goes through a one way encryption algorithm that gives a unique digital fingerprint to the file

A

Hashing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Occurs when the data is modified during storage, at rest, or transit.

A

Failure of integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Having good backup strategies and disaster recovery plans ensure which one of the CIA triad?

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

3 main things to remember when regarding CIA triad

A

Confidentiality – Encryption (like WPA2)
Integrity – Hashing (like MD5, SHA-1)
Accessibility – Redundancy & reliability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

System that is not on the baseline of what is approved by the organization.
(Configuration baseline is a set of recommendations for deploying a computer in a hardened configuration)
System that is not compliant in the configuration baseline.

A

Non-compliant System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

5 main vulnerabilities to network and systems

A

1) Non-compliant systems
2) Unpatched systems
3) Unprotected systems
4) EOL (End-of-Life) OSs
5) BYOD (Bring your own device)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

An attack that attempts to make a computer or server’s resources unavailable

A

Denial of Service (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Specialized type of DoS attack that attempts to send more packets to a server or host

A

Flood attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Type of flood DoS attack that happens when too many pings (IMCP echo) are being sent

A

Ping Flood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Type of flood DoS attack where the attacker initiates multiple TCP sessions but never completes the three-way handshake

A

SYN Flood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
3 ways to prevent DoS attacks
1) Flood Guards 2) Time Outs 3) Intrusion Prevention
23
Type of DoS attack that exploits a security flaw to permanently break a networking device by reflashing its firmware
Permanent Denial of Service (PDoS)
24
Attack that creates a large number of processes to use up the available processing power of a computer
Fork Bomb
25
Uses lots of machines to attack a server to create a DoS
Distributed Denial of Service (DDoS)
26
Type of DDoS attack that allows an attacker to send packets to flood the victim's website to initiate DNS requests
DNS Amplification
27
A way to prevent a DoS attack that identifies attacking IP addresses and routes them to a non-existent server through the null interface
Blackhole/Sinkhole
28
A way to prevent a DoS attack that identifies and responds to small-scale DoS attacks
Intrusion Prevention
29
A way to prevent a DDoS attack that scales up when demand increases
Elastic Cloud Infrastructure (companies such as Cloudflare and Akamai)
30
3 main spoofing attacks
1) IP spoofing 2) MAC spoofing 3) ARP spoofing
31
Attack that occurs when an attacker masquerades as another person by falsifying their identity electronically
Spoofing
32
Spoof that modifies the source address of an IP packet to hide the identity of the sender or impersonate another client
IP spoofing
33
What layer of the OSI model is IP spoofing apart of?
Layer 3
34
What layer of the OSI model is MAC spoofing apart of?
Layer 2
35
Attacker changes the MAC address to pretend the use of a different network interface card or device
MAC spoofing
36
Relies on a list of all known and authorized MAC addresses
MAC Filtering
37
Command to spoof a MAC address
sudo ifconfig en0 ether
38
Type of spoof attack where the attacker sends falsified ARP messages over a local area network
ARP spoofing
39
Occurs when an attacker puts themself between the victim and the intended destination
On-Path attack
40
Ways to produce an On-Path attack
1) ARP poisoning 2) DNS poisoning 3) Introducing a rogue WAP (Wireless access point) 4) Introducing rogue hub/switch
41
During an on-path attack happens, occurs when valid data is captured by the attacker and is then repeated immediately, or delayed, and the repeated
Replay
42
During an on-path attack happens, occurs when the attacker inserts themself between the two hosts
Relay
43
Occurs when an attacker tricks the encryption application into presenting the user with an HTTP connection instead of an HTTPS connection (to bypass secure encryption)
SSL Stripping
44
Occurs when an attacker attempts to have a client or server abandon a higher security mode in favor of a lower security mode
Downgrade attack
45
SQL stand for
Structured Query Language
46
An attack consisting of the insertion or injection of an SQL query via input data from the client to a web application
SQL Injection
47
Insertion of additional information or code through data input from a client to an application
Injection attack
48
4 Common types of Injection attacks
1) SQL (most common) 2) HTML 3) XML 4) LDAP
49
Example of SQL injection (returns value of True)
Typical: username: Jason password: pass123 SQL Injection username: Jason password: 'OR 1=1;
50
How can SQL injection be prevented? (2)
1) Input validation 2) Least privilege
51
Attack occurs when an attacker embeds malicious scripting commands on a trusted website
Cross-Site Scripting (XSS)
52
3 types of Cross-Site Scripting (XSS) attacks
1) Stored/Persistent 2) Reflected 3) DOM-based
53
Type of XXS attack that attempts to get data provided by the attacker to be saved on the web server by the victim
Stored/Persistent
54
Type of XXS attack that attempts to have a non-persistent effect activated by a victim clicking a link on the site
Reflected
55
Type of XXS attack that attempts to exploit the victim's web browser
Document Object Model (DOM)-based
56
How to prevent XSS attacks? (2)
1) Output encoding 2) Proper input validation
57
Attack that occurs when an attacker forces the user to execute actions on a web server for which they are already authenticated
Cross-Site Request Forgery (XSRF/CSRF)
58
How to prevent XSRF? (4)
1) Tokens 2) Encryption 3) XML file scanning 4) Cookie verification
59
Tool used to test the strength of passwords to ensure password policies are being followed properly
Password Analysis tool
60
Uses comparative analysis to break passwords and systematically continues guessing until the password is determined
Password Cracker
61
2 most well know password crackers
1) Cain & Abel 2) John the Ripper
62
4 types of password cracking methods
1) Password Guessing 2) Dictionary Attack 3) Brute-force Attack 4) Cryptanalysis Attack
63
Type of password cracking attack that occurs when a weak password is simply figured out by a person
Password Guessing
64
Type of password cracking attack method where a program attempts to guess the password by using a list of possible passwords (lots common passwords)
Dictionary Attack
65
Type of password cracking attack method where a program attempts to try every possible combination until it cracks the password (counts from 000 to 001 to 002)
Brute-Force attack
66
Type of password cracking attack that compares a precomputed encrypted password to a value in a lookup table / rainbow table
Cryptanalysis Attack
67
*(No longer included in exam)* Type of password cracking attack that attempts to crack a password by threatening or causing a person physical harm in order to make them tell you the password
Rubber Hose Attack
68
An employee or other trusted insider who uses their authorized network access in unauthorized ways to harm the company
Insider Threat
69
A specific type of malware that is tied to either a logical event or a specific time (like entering a code every 24 hours)
Logic Bomb
70
Which type of threat actor can accidentally or inadvertently cause a security incident in your organization? a) Hacktivist b) Insider threat c) Organized Crime d) APT (advanced persistent threats)
**b) Insider threat**
70
Which of the following attacks would most likely be used to create an inadvertent disclosure of information from an organization's database? a) SQL injection b) Cross-site scripting c) Buffer overflow d) Denial of Service
**a) SQL injection** *SQL injection is a type of attack where malicious SQL code is inserted into a web application's input fields, such as search boxes or login forms, in order to manipulate the database. If the application does not properly validate or sanitize user input, the attacker could exploit this vulnerability to: Retrieve unauthorized data from the database. Expose sensitive information such as passwords, personal details, or other confidential records. Potentially modify or delete data, depending on the severity of the vulnerability. This attack directly targets the database and could lead to inadvertent disclosure of sensitive information, especially if the attacker successfully exploits the vulnerability to retrieve private or restricted data. Why the other attacks are less likely for inadvertent disclosure: b) Cross-site scripting (XSS): XSS attacks primarily target the users of a website, not the database. They allow attackers to inject malicious scripts into web pages viewed by other users, which could lead to the theft of cookies or session tokens, but not necessarily database information. c) Buffer overflow: This attack generally targets vulnerabilities in a program's memory and can lead to crashes or code execution on the system. While it can be dangerous, its primary goal is not to retrieve data from a database. d) Denial of Service (DoS): A DoS attack seeks to make a system or service unavailable by overwhelming it with traffic or requests. It does not aim to extract or disclose information from a database but rather to disrupt services.*
70
Tony works for a company as a cybersecurity analyst. His company runs a website that allows public postings. Recently, users have started complaining about the website having pop-up messages asking for their username and password. Simultaneously, your security team has noticed a large increase in the number of compromised user accounts on the system. What type of attack is most likely the cause of both of these events? a) SQL injection b) Rootkit c) Cross-Site request forgery d) Cross-Site scripting
**d) Cross-Site scripting**