IT/SECURITY

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/28

flashcard set

Earn XP

Description and Tags

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

29 Terms

1
New cards

SSL stripping is an example of: (Select 2 answers)

Downgrade Attack, On-path attack

2
New cards

Memory leak

A situation in which an application fails to properly release memory allocated to it or continually requests more memory than required

3
New cards

Which of the following alters the external behavior of an application and at the same time does not introduce any changes to the application's code?

Shimming

4
New cards

Sideloading

The practice of modifying an application's code without changing its external behavior

5
New cards

Which of the following terms refer to software/hardware driver manipulation techniques? (Select 2 answers)

Refactoring , Shimming

6
New cards

Which of the following wireless technologies enables identification and tracking of tags attached to objects?

RFID

7
New cards

RFID is vulnerable to: (all)

  • Spoofing

  • Eavesdropping

  • Data interception

  • Replay attacks

  • Denial-of-Service (DoS) attacks

8
New cards

Replay attack

a form of network attack where an attacker intercepts and retransmits data that was previously exchanged between two parties. Fundamentally, a replay attack occurs when an attacker is able to capture data-in-transit in cleartext form. Replay attacks may capture various forms of authentication data, such as passwords, session tokens, or cryptographic authentication hashes.

9
New cards

What is the most common form of a DDoS attack?

Network-Based DDos

10
New cards

NFC is vulnerable to: (all)

  • Data interception

  • Replay attacks

  • Denial-of-Service (DoS) attacks

11
New cards

Which type of DDoS attack targets industrial equipment and infrastructure?

Operational Technology (OT)

12
New cards
13
New cards

SSL

Is a deprecated encryption protocol

14
New cards

A type of formal document that describes the specifications for a particular technology is known as:

Request for Comments (RFC)

15
New cards

TAXII

a dedicated transport mechanism for cyber threat information

16
New cards

Automated Indicator Sharing

a US government initiative for real-time sharing of cyber threat indicators

17
New cards

Deep Weeb

Cannot be indexed by Web Crawlers, 400-500x bigger than surface web

18
New cards

Dark Web

0.01% of deep web only a few thousand websites

19
New cards
20
New cards
21
New cards
22
New cards
23
New cards
24
New cards
25
New cards
26
New cards
27
New cards
28
New cards
29
New cards