Common Security Failures Flashcards

(62 cards)

1
Q

____ is designed to overwhelm the resources of a system to the point where it is unable to reply to legitimate service requests.

A

Denial-of-service attack (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

____ attack is similar in that it also seeks to drain the resources of a system. A ___ attack is initiated by a vast array of malware-infected host machines controlled by the attacker.

A

Distributed Denial-of-service attack (DDoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

These are referred to as ______ attacks because the victim site is unable to provide service to those who want to access it.

A

“denial of service”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

One common way to prevent DoS attacks is to use a ____ that detects whether requests sent to your site are legitimate.

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

____ types of cyber attacks refer to breaches in cybersecurity that make it possible for an attacker to eavesdrop on the data sent back and forth between two people, networks, or computers.

A

man-in-the-middle (MITM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

It is called a _____ attack because the attacker positions themselves in the “middle” or between the two parties trying to communicate.

A

“man in the middle”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Some ways to protect yourself and your organization from MITM attacks is by using strong encryption on access points or to use a ____

A

Virtual private network (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

___ occurs when a malicious actor sends emails that seem to be coming from trusted, legitimate sources in an attempt to grab sensitive information from the target.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

____ combine social engineering and technology and are so-called because the attacker is, in effect, “fishing” for access to a forbidden area by using the “bait” of a seemingly trustworthy sender.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

____ is so-named because it goes after the “big fish” or whales of an organization, which typically include those in the C-suite or others in charge of the organization.

A

whale-phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The attacker takes the time to research their intended targets and then write messages the target is likely to find personally relevant.

A

Spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

These types of attacks are aptly called ____ because of the way the attacker hones in on one specific target.

A

spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Often, a spear-phishing attack uses _____, where the information inside the “From” portion of the email is faked, making it look like the email is coming from a different sender.

A

email spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

the victim’s system is held hostage until they agree to pay a ransom to the attacker. After the payment has been sent, the attacker then provides instructions regarding how the target can regain control of their computer.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The name _____ is appropriate because the malware demands a ransom from the victim.

A

“ransomware”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The malware is written to exploit vulnerabilities that have not been addressed by either the system’s manufacturer or the IT team.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

You can also prevent many ransomware attacks by using a _____ that can perform deep data packet inspections using artificial intelligence (AI) that looks for the characteristics of ransomware.

A

next generation firewall (NGFW)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Passwords are the access verification tool of choice for most people, so figuring out a target’s password is an attractive proposition for a hacker.

A

Password attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A ____ is a technique that uses common words and phrases, such as those listed in a dictionary, to try and guess the target’s password.

A

dictionary attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A ____ password hack uses basic information about the individual or their job title to try to guess their password.

A

brute force

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

One effective method of preventing brute-force and dictionary password attacks is to set up a ___. This locks out access to devices, websites, or applications automatically after a certain number of failed attempts.

A

lock out policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

___ is a common method of taking advantage of websites that depend on databases to serve their users.

A

Structured Query Language injection (SQL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The command is inserted, or “injected”, into a data plane in place of something else that normally goes there, such as a password or login. The server that holds the database then runs the command and the system is penetrated.

A

SQL Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

If an _____succeeds, several things can happen, including the release of sensitive data or the modification or deletion of important data

A

SQL Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
To shield yourself from an SQL injection attack, take advantage of the _____. With ____ architecture, only those who absolutely need to access key databases are allowed in.
least privilege model
26
attackers alter and fabricate certain URL addresses and use them to gain access to the target’s personal and professional data
URL Interpretation
27
URL Interpretation also means ___
URL Poisoning
28
The name _____comes from the fact that the attacker knows the order in which a web-page’s URL information needs to be entered. The attacker then “interprets” this syntax, using it to figure out how to get into areas they do not have access to.
URL Interpretation
29
a hacker may guess URLs they can use to gain administrator privileges to a site or to access the site’s back end to get into a user’s account. Once they get to the page they want, they can manipulate the site itself or gain access to sensitive information about the people who use it.
URL Interpretation
30
To prevent URL interpretation attacks from succeeding, use secure authentication methods for any sensitive areas of your site. This may necessitate ____ or secure passwords consisting of seemingly random characters.
multi factor authentication (MFA)
31
a hacker alters DNS records to send traffic to a fake or “spoofed” website.
Domain Name System Spoofing (DNS)
32
The hacker may also construct a poor-quality site with derogatory or inflammatory content to make a competitor company look bad.
DNS Spoofing
33
the attacker takes advantage of the fact that the user thinks the site they are visiting is legitimate. This gives the attacker the ability to commit crimes in the name of an innocent company, at least from the perspective of the visitor.
DNS Spoofing
34
is one of multiple types of MITM attacks. The attacker takes over a session between a client and the server.
Session hijacking
35
The computer being used in the attack substitutes its Internet Protocol (IP) address for that of the client computer, and the server continues the session without suspecting it is communicating with the attacker instead of the client.
Session Hijacking
36
This kind of attack is effective because the server uses the client's IP address to verify its identity. If the attacker's IP address is inserted partway through the session, the server may not suspect a breach because it is already engaged in a trusted connection
Session Hijacking
37
To prevent session hijacking, use a ___ to access business-critical servers.
VPN
38
___ gets its name from the “brutish” or simple methodology employed by the attack.
brute force attacks
39
The attacker simply tries to guess the login credentials of someone with access to the target system. Once they get it right, they are in.
Brute force attacks
40
The attacker provides the bot with a list of credentials that they think may give them access to the secure area. The bot then tries each one while the attacker sits back and waits. Once the correct credentials have been entered, the criminal gains access.
Brute force attacks
41
To prevent brute-force attacks, have ____ in place as part of your authorization security architecture.
lock out policies
42
___ refer to threats that target vulnerabilities in web-based applications.
Web attacks
43
Hackers also use _____ attacks and parameter tampering. In a ____ attack, the victim is fooled into performing an action that benefits the attacker.
cross-site request forgery (CSRF)
44
___ involves adjusting the parameters that programmers implement as security measures designed to protect specific operations.
parameter tampering
45
Sometimes, the most dangerous actors come from within an organization.
Insider threats
46
People within the organization often have an in-depth understanding of its cybersecurity architecture, as well as how the business reacts to threats. This knowledge can be used to gain access to restricted areas, make changes to security settings, or deduce the best possible time to conduct an attack.
Insider threats
47
____ uses a malicious program that is hidden inside a seemingly legitimate one.
Trojan horse
48
____ a hacker embeds malicious code into an insecure website. When a user visits the site, the script is automatically executed on their computer, infecting it.
Drive-by attacks
49
____the attacker transmits malicious scripts using clickable content that gets sent to the target’s browser.
cross-site scripting (XSS)
50
When the victim clicks on the content, the script is executed. Because the user has already logged into a web application’s session, what they enter is seen as legitimate by the web application. However, the script executed has been altered by the attacker, resulting in an unintended action being taken by the “user.”
XSS
51
___ involve the bad actor intercepting traffic as it is sent through the network.
Eavesdropping attacks
52
____ can be active or passive.
Eavesdropping attacks
53
With ____ eavesdropping, the hacker inserts a piece of software within the network traffic path to collect information that the hacker analyzes for useful data.
active
54
With _____eavesdropping, attacks are different in that the hacker “listens in,” or eavesdrops, on the transmissions, looking for useful data they can steal.
Passive
55
____ an attacker abuses a security feature: hash algorithms, which are used to verify the authenticity of messages.
birthday attack
56
The _____ is a digital signature, and the receiver of the message checks it before accepting the message as authentic.
hash algorithm
57
The name ______refers to the birthday paradox, which is based on the fact that in a room of 23 people, there is more than a 50% chance that two of them have the same birthday. Hence, while people think their birthdays, like hashes, are unique, they are not as unique as many think.
“birthday attack”
58
____ is a general term for malicious software,
Malware
59
____ infects a computer and changes how it functions, destroys data, or spies on the user or network traffic as it passes through.
Malware
60
_____ can either spread from one device to another or remain in place, only impacting its host device.
Malware
61
Several of the attack methods described above can involve forms of _____, including MITM attacks, phishing, ransomware, SQL injection, Trojan horses, drive-by attacks, and XSS attacks.
malware
62
In a ______, the software has to be installed on the target device.
malware attack