Threats, Attacks, and Vulnerabilities Flashcards
What is the difference between intrusive versus non-intrusive vulnerability scans?
Non-intrusive identifies active OSs, applications, and ports by scanning system attributes, which intrusive actually probes devices and examines their responses.
Which type of attack involves flooding a recipient e-mail address with identical e-mails?
Spamming attack
What type of attack sequentially generates every possible password and checks them all against a password file
Brute force attack
Which type of attack allows an attacker to redirect Internet traffic by setting up a fake DNS server to answer client requsts?
DNS spoofing
What is spear phishing?
Phishing attempt that appears to come from a trusted person
What is a replay attack?
An attack where an intruder records the communication between a user and a server, and plays the recorded information back to impersonate the user
What does the acronym XSRF denote>
Cross-Site Request Forgery
What category of threat actor is most likely to have high funding and a high level of sophistication?
State actors or APTs (Advanced Persistent Threats)
What occurs during grey-box testing?
Security professionals with limited inside knowledge of the network attempted to hack into the network
What social engineering principle is being used when limited availability is used as a technique
Scarcity
What is bluesnarfing?
The act of gaining unauthorized access to a device (and the network it is connected to) through its Bluetooth connection
What is a flaw, loophole, or weakness in the system, software, or hardware?
Vulnerability
What viruses are written in a macro language and typically infect operating systems?
Macro viruses
What is phishing
When a request for confidential information that appears to originate from a seemingly trusted entity is recieved
What self-replicating computer program sends copies of itself to other devices on the network?
Worm
What is the most likely cause of a single computer communicating with an unknown IRC server and scanning other systems on the network
The computer is infected with a botnet
What is pharming
Traffic redirection to a website that looks identical to the intended website
What type of attack embeds an intruder to capture and modify data traffic by rerouting the traffic from a network device to the intruder’s computer
Network address hijacking
What category of vulnerability includes injection, cross-site scripting, and cross-site request forgery
Improper input handling
What is a trojan horse?
Malware that is disguised as a useful utility, but is embedded with a malicious code to infect computer systems
What is Nessus?
Network vulnerability scanner
What is an evil twin?
An access point with the same SSID as the legitimate access point
What does the acronym XSS denote?
Cross site scripting
What is an integer overflow
When an application or OS tries to place into computer memory an integer that is too large for the data type