1/60
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Smart Cards
- provide certificate based authentication
- requires a smart card reader to authenticate
Persistent (Stored) Cross-Site Scripting Attacks
- malicious code is placed on a centralized server, such as a social media website
- inside of a comment, for example
- everybody who visits the page or who views the comment gets attacked
- no specific target
Standard Operating Environments
- a set of tested and approved hardware/software systems
- often a standalone OS image
Does biometric authentication store an image of your unique biometric?
no, biometric authentication is usually stored as a mathematical representation.
Magnometers
- metal detectors
- provides passive scanning
MDM
provides centralized management for company owned and user owned devices
Access Control Lists (acronym)
ACL
Whaling
spear phishing the CEO of a company
Piggybacking
- uses an authorized person to gain unauthorized access to a building
- unlike tailgating, the attacker does have consent
- for example, the attacker is holding donuts and asks to have the office door held for them
Zero-Day Attacks
- an attack type that exploits a vulnerability, known to the attackers, but unknown to the application's/system's/device's vendor and support team are aware of it
- utilizes exploit code
Address Resolution Protocol (acronym)
ARP
ARP Poisoning
- utilizes spoofing
- an on-path attack that occurs on the local IP subnet
- due to ARP's lack of security features
Cross-Site Scripting (acronym)
XSS
Cross-Site Scripting
- we take information from one website and share it with another
- utilizing browser security flaws
- one of the most common web application development errors
- by using malware that takes advantage of JavaScript
Standard Operating Environment (acronym)
SOE
End of Service Life (acronym)
EOSL
Windows Defender Antivirus
- built into Windows 10 and Windows 11
- included in the Windows security application
- operates in real-time
- virus & threat protection settings > manage settings > real-time protection
BitLocker
- encrypts an entire volume
- all data, including the OS
- not included in Windows Home editions
EFS
- encrypt at the file system level
- requires NTFS
- uses a username and password to encrypt the key
- administrative password resets cause EFS files to be inaccessible
Verifying Certificate Details (list)
verify
- not expired
- domain name
- properly signed
- date and time
Key Fobs
- contains a small RFID key
- contactless
- replaces a physical key
- utilizes proximity operationality
Mobile Device Management (acronym)
MDM
Rule of Least Privilege
rights and permissions should be set to the bare minimum for both user accounts and applications.
ACL
- used to allow or deny traffic
- also used by operating systems
- commonly used on the ingress or egress of a routing interface
Phishing
- social engineering with a touch of spoofing
- often delivered by email or over text
Voice Phishing (acronym)
Vishing
Vishing
- phishing that occurs over the phone or through voicemail
- caller ID spoofing is common
Spear Phishing
targeted phishing, using insider information
Tailgating
- uses an authorized person to gain unauthorized access to a building
- the attacker does not have consent
On-Path Attacks
- also known as a man-in-the-middle attack
- the attacker sits in between your system and the network, and redirects your traffic
On-Path Browser Attacks
- the man-in-the-middle is on the local device, in the browser
- the attacker uses the advantage of encrypted traffic being so easy to proxy
- malware, often a trojan horse does all of the proxy work
Hashes and Hashing a Password
- represent data as a fixed-length string of test
- will likely not have a collision (match another hash)
- makes it impossible to recover an original message from the digest
- without knowing the hash, the hashing method, etc.
- SHA-256 is a common hashing method.
- different operating systems and applications use different hash algorithms.
Brute Force Attacks
- a form of password attack where attackers try every single possible password combination, until the password's hash is matched
- time consuming
- also requires a large amount of computing power and resources
Code Injection
- adding your own code into a data stream
- enabled due to bad programming
- many different data types
Structured Query Language (acronym)
SQL
SQL Injection
- a method of code injection where SQL requests are modified
- if you can manipulate an SQL database, then you can control the application
Why is Cross-Site Scripting abbreviated as XSS?
though CSS seems like a better acronym for cross-site scripting, it is already utilized for a programming language, used in website design.
What are some of the most common programming languages, used for developing websites and web applications? (list)
- JavaScript
- provides the interactivity to websites and web applications
- HTML
- CSS (cascading style sheets)
- used for describing the presentation of code, written in a term-30markup language, such as HTML
- Java
- not related to JavaScript
- used to develop web applications, games, and software
Uniform Resource Locator (acronym)
URL
Non-Persistent (Reflected) Cross-Site Scripting Attacks (steps)
1. the website allows scripts to run inside of user input prompts and text boxes
2. to utilize this design flaw, the attacker emails a link
3. this link runs a script that sends credentials, session IDs, and cookies to the attacker
4. simultaneously, the script embedded in the URL executes in the victim's browser
URL vs Domain Name (example)
- google.com is an example of a fully qualified domain name.
- as seen above, a domain name does not include the protocol, and any subdomains, paths, or file names.
- a website URL includes all of these components.
- https://www.google.com/search?q=domain+name&sxsrf=ALiCzsYV67... is an example of a URL, and includes the domain name, "google.com", as well as the:
- protocol (HTTPS)
- subdomain (www)
- path (/search?q=domain+name&sxsrf=ALiCzsYV67/)
- always ends with "/"
- in this example, the URL is shortened due to space constraints (shown by the "..." at the end of the shown URL"
- as our web search did not lead us into viewing or opening a file, no file path is included.
- an example of a URL with a file path, however, is https://www.google.com/search/file.html
- (note that this URL is made-up)
- this example's file path is "file.html"
** (note that miranda, the creator of this Quizlet set is currently unsure if the file path of a URL includes the backslashes, or not. however, extensive URL knowlege is not listed in the exam objetives, and therefore, is very unlikely to be on the CompTIA A+ 220-1102 A+ Exam. in the future (after i pass my exam), though, i'll try to remember to further research this, and will edit this term's definition, accordingly :)) **
** insert image of miranda peace signing for time-keeping purposes, i'm typing this the evening of 8/6/22, with my test scheduled for 8/9/22; let's see how long my update takes! **
URL
a complete web address
Will disabling JavaScript protect against Cross-Site Scripting attacks?
yes, however, it's not a practical solution
When does Microsoft release Window's patches?
the second tuesday of every month at 10:00am PST
Patch Management (steps)
1. test
2. prioritize
3. deploy
EOL Operating Systems
- manufacturer stops selling an OS
- may continue supporting it, though
EOSL
- similar to EOD, but support is no longer available
- a costly, premium support option may exist, though
Windows Firewall Exception Rule Types (list)
- program
- port
- predefined
- custom
Windows Authentication
- log in using a local account or a Microsoft account or a domain account
- Windows domain credentials are SSO
NTFS Permissions
- apply from local and network connections
- inherited from the parent
Share Permissions
- only apply to connections over the network
- the most restrictive setting wins
Explicit Permissions
- set by us
- take precedence over inherited permissions
User Account Control (acronym)
UAC
User Account Control
- pop-up approval screen
- limits user capabilities
- secure desktop
BitLocker To Go
- BitLocker FDE for USB drives
- not included in Windows Home editions
Autoplay
- settings > bluetooth & devices > Autoplay
- AutoRun on older Windows operating systems
Cache
locally stored browser data
Unable to Access The Network (Troubleshooting)
- may be due to malware
- symptoms:
- slow performance and lock up
- internet connectivity issues
- OS update failures
- use malware cleaner or reload from a known good backup
Altered System or Personal Files (Troubleshooting)
- indicates malware
- remove or reload from a known good backup
Browser Redirection (Troubleshooting)
- malware is the most common cause
- best practice is to restore from a known good backup
Still learning (20)
You've started learning these terms. Keep it up!