Threats & Vulnerabilities Flashcards

(40 cards)

1
Q

What is adware?

A

i.e Malicious software popup prompting to buy something

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a virus?

A

Attaches itself as malicious payload to another program, spreads via a host file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is spyware?

A

Retrieving sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a trojan?

A

Malicious software disguised as something else, does not replicate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a rootkit?

A

Program hides using bootstrap loader system/kernel level access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a logic bomb?

A

Malicious code that triggers based on certain conditions being met

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is ransomware?

A

Denying access to computer for extortion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is polymorphic malware?

A

Malware that changes it’s behavior to evade AV signature definition detection, code remains the same i.e encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is an armored virus?

A

Virus specifically designed to prevent its source code being analysed, trick AV program space it is running is somewhere else

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a smurf attack?

A

Ping request to broadcast address to cause all client to respond, combines with source address spoofing for DoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a replay attack?

A

Replaying data i.e log in sequence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What can be used to mitigate replay attacks?

A

Session token that expires

Anti replay counter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is spoofing?

A

Impersonation of another entity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is SPAM vs SPIM?

A

SPAM is unwanted email

SPIM is unwanted messages on instant messaging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a XMAS attack?

A

Port scanning + discovering underlying OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is pharming?

A

DNS poisoning

change lmhost file, dns cache resolution, dns sever

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

How would MITM be achieved with ARP poisoning?

A

Spoof MAC address of another computer

Change victim computer default gateway to relay through rogue computer

18
Q

What is XSS?

A

Cross-Site Scripting

19
Q

What is transitive access?

A

Access gained indirectly

i.e jump host

20
Q

What is a worm?

A

Malicious software that replicated between systems without a host file

21
Q

What is a rainbow table?

A

List of common password hashes

22
Q

What is a birthday attack?

A

Using hash collisions to gain access despite data being different

23
Q

What is typo squatting?

A

Misleading by wrong url

i.e googlee.com

24
Q

What is a watering hole attack?

A

Compromising known website to infect computer

25
What is reciprocity?
Complying with someone because they did something beneficial to you
26
What is consensus?
Following what everyone else is doing
27
How to you protect against a cross-site scripting attack?
Input & output validation on server side Input client to server Output server responding to client
28
What is an attack vector for cross-site scripting?
Customized link with an embedded script
29
What is a way to protect against SQL injection?
Turn off SQL commands and used stored procedures
30
What is directory traversal/command injection?
Navigating through file system to execute something
31
What is banner grabbing?
Scanning port activity during vulnerability scan for additional information
32
What is black box penetration testing?
No prior knowledge of target infrastructure
33
What is white box penetration testing?
Full knowledge of infrastructure before testing
34
What is gray box penetration testing?
Some knowledge of infrastructure before testing
35
What is XSRF?
Cross-site Request Forgery
36
What advantages does NoSQL have against SQL?
Not subject to SQL injection | Highly scalable
37
What is fuzzing?
Entering random data on software in attempt to break it with an exception that cannot handle the error (trial and error)
38
What is blue snarfing?
Theft of information from Bluetooth device
39
What is blue jacking?
Pushing information to a Bluetooth device
40
What is metamorphic malware?
Malware changes itself each iteration retaining the same functionality