vuln assesment final study

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/37

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

38 Terms

1
New cards

Purpose of a DMZ

B. To isolate public services from internal systems

2
New cards

Symmetric Encryption

A method of encryption where the same key is used for both encryption and decryption, ensuring data confidentiality.

3
New cards

What feature of NTFS can be abused to hide data

The Alternate Data Streams (ADS) feature allows files to contain hidden data that is not visible in standard file listings.

4
New cards

Alternate Data Stream

A feature of the NTFS file system that allows files to have multiple data streams, enabling hidden data storage that is not visible in typical directory views.

5
New cards

Which component of a wireless network is responsible for forwarding traffic between
wireless and wired segments?

the access point.

6
New cards

A poorly secured printer poses risk because:

it can be accessed by unauthorized users, potentially exposing sensitive documents or enabling network attacks.

7
New cards

A monolithic kernel OS is characterized by:

a single large program that manages all system resources, including device drivers and system calls.

8
New cards

Which wireless security feature protects against brute-force PIN cracking

WPS Lockout

9
New cards

QoS Scheduling

the process in networks and operating systems of prioritizing data traffic to ensure critical applications get the performance (bandwidth, low latency) they need

10
New cards

Which protocol is commonly abused for covert data exfiltration due to its

permissiveness

DNS

11
New cards

FAT32

an older, widely compatible file system for drives. up to 4 gigs per file size

12
New cards

NTFS

the default file system for modern Windows operating systems used to organize and store files on hard drives and SSDs

13
New cards

Null session

Windows based attack that attempts to login to a network without a username or a password

14
New cards

ICS (Industrial Control Systems)

broad category of systems controlling industrial processes,

15
New cards

SCADA (Supervisory Control and Data Acquisition)

specific type of ICS focused on monitoring and controlling large, geographically dispersed operations like utilities, acting as the "eyes" and "brain" for big-picture management

16
New cards

Dynamic web content

generate content on the fly, often based on user input, real-time data, time of day, user location, or other factors

17
New cards

Static web content

deliver the exact same content to every user, every time, unless a developer manually modifies the source files.

18
New cards

WEP (Wired Equivalent Privacy)

Obsolete, insecure, easily hackable and uses RC4 with key reuse.

19
New cards

WPA (Wi-Fi Protected Access)

Introduced TKIP (Temporal Key Integrity Protocol) with RC4, improving key management.

20
New cards

WPA2 (Wi-Fi Protected Access 2)

Still a strong, widely used standard.has known vulnerabilities (like KRACK). Uses strong AES (Advanced Encryption Standard) with CCMP

21
New cards

WPA3 (Wi-Fi Protected Access 3)

Features stronger authentication (SAE - Simultaneous Authentication of Equals) and individualized data encryption for enhanced privacy, even on open networks (WPA3-Enhanced Open).

22
New cards

Rogue access point

unauthorized wireless device connected to a secure network, creating a dangerous security hole where attackers can intercept data, inject malware, or spy on users, often by mimicking legitimate network names

23
New cards

Evil twin

hacker sets up a fake Wi-Fi access point that perfectly mimics a legitimate or public network to trick users into connecting.

24
New cards

Kismet

powerful, open-source wireless network detector, sniffer, and intrusion detection system (IDS) that passively analyzes 802.11 (Wi-Fi) traffic, identifying networks, capturing packets, and finding hidden SSIDs

25
New cards

Air Crack

assess WiFi network security including: monitoring, attacking, testing, and cracking. The suite tests the strength of

26
New cards

PKI

a system of hardware, software, policies, and procedures for managing digital certificates and public keys to secure digital communications. It enables the secure exchange of data over networks by creating a trusted system that uses a pair of public and private keys to authenticate identities

27
New cards

Standard ACL

filter traffic based only on the source IP address

28
New cards

Extended ACL

Filters based on Source/Destination IP, Protocol (TCP, UDP, ICMP), Source/Destination Ports, etc..

29
New cards

UTM (Unified Threat Management)

an all-in-one security solution that consolidates multiple security functions, like firewalls, antivirus, VPN, and intrusion prevention (IPS), into a single appliance or platform

30
New cards

Repeated beaconing

malware's tactic of sending regular, small signals (beacons) to a malicious Command & Control (C2) server, acting as a "heartbeat" to show the infected system is active and ready for instructions

31
New cards

tcp.flags.syn 1 and tcp.flags.ack 0

initiating a new connection (SYN) but are not acknowledging any previous data (ACK=0)

32
New cards

tcp.len > 0

display filter used to show only TCP packets that contain actual application data (payload), excluding control packets like SYN, FIN, or pure ACKs that have a zero-length payload,

33
New cards

A SCADA environment is typically designed with

Air-gapping or strict isolation. 

34
New cards

Air-gapping

a security measure that physically or logically isolates a computer system or network from all other networks, such as the internet, to prevent remote access and cyberattacks

35
New cards

In a wireless environment, a hidden SSID:

only removes the network name from the Access Point's (AP) beacon frames. The network and its name are still present in other management frames and data frames, such as probe response frames, once a device attempts to connect.the purpose of a hidden ssid attack

36
New cards

the purpose of a hidden ssid attack

discover the name (SSID) of a Wi-Fi network that is not openly broadcasting its name, or to trick a user's device into connecting to a rogue network

37
New cards

Which web application weakness allows unauthorized retrieval of confidential files?

Insecure direct object reference

38
New cards

Insecure direct object reference

occurs when an application provides a direct reference to an internal implementation object (like a file path or database key) and uses user-supplied input to access that object without sufficient authorization