Cybersecurity

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/118

encourage image

There's no tags or description

Looks like no tags are added yet.

119 Terms

1
New cards
XSS (Cross Site Scripting)
What type of web attack relies on the Same Origin Policy to make sure the uploaded malicious content is run with the same permissions as the content from the trusted website?
2
New cards
Buffer Overflow
What type of web attack will provide too much input into a form so that the data received by the program is dumped over into the memory or CPU without any security restrictions?
3
New cards
Shortening
What is canonicalization used for?
4
New cards
Website, Browser, ISP
What are the 3 components to focus on when securing online communications?
5
New cards
C14N
\____________________________ is used by websites to deal with the many different ways the URL or user input can be encoded.
6
New cards
SSL/TLS
What two security protocols can be bypassed by using a Backdoor or Trojan to install a keylogger?
7
New cards
Max version and Cipher Option
In the SSL/TLS handshake, the browser and website must agree on what two things
8
New cards
FREAK, POODLE, DROWN, Logjam
Name 4 encryption downgrade attacks
9
New cards
Fuzzing
automating the process of injecting unexpected input into an application with the goal of uncovering exploitable vulnerabilities
10
New cards
buffer overflow attack
What attack will be possible if the programmer sets a variable to 12 characters but does not validate that the user input stays within this maximum?
11
New cards
Stateful
A \____________________ website can deliver dynamic content and keep track of user preferences.
12
New cards
Non-persistent Cookie
When a user is visiting a website without creating a profile, what type of cookie is used to facilitate interaction with the browser and will be stored only until the browser is closed?
13
New cards
Directory Traversal
What type of attack is being used with the following input? /users/cwe/profiles/../../../bin/john.conf
14
New cards
SQL Injection
Identify what type of attack is being used with the following input: ' or '1'\='1' and firstname
15
New cards
Sandboxing
a security mechanism for separating running programs so that they cannot interfere with any other processes
16
New cards
Cookies
\_______________________ can be used to track a user's browsing habits on the Internet.
17
New cards
ActiveX
Which Web browser plugin uses Authenticode for security?
18
New cards
SSL
If a firewall has enabled TCP transport layer protocol and port 443, what protocol is now supported on the firewall?
19
New cards
Policy
high-level statement of principles about Internet usage by employees
20
New cards
Procedure
Step by step instructions for completing the things within the policy
21
New cards
Section 419 Email
What is another name for a Nigerian Prince letter which is the most common type of phishing?
22
New cards
Reverse Social Engineering
\_______________________________ is when an attacker tries to convince the target to initiate contact and then gets the target to give up confidential information.
23
New cards
Dumpster Diving
\________________________ is a method of finding information by going through the trash of the target to find information that could be useful to the attacker.
24
New cards
Shoulder Surfing
A person parks his car by an ATM, sets up a small camera discreetly pointed at ATM keypad, and then pretends to be going through bank papers in his car. This would be an example of:\____________________
25
New cards
VPN (Virtual Private Network)
Which defensive tool creates a tunnel to move data packets?
26
New cards
DMZ (demilitarized zone)
Which defensive tool is a neutral network that connects two or more other networks?
27
New cards
VLAN(Virtual Local Area Network)
Which defensive tool will help mitigate against an ARP Poisoning attack?
28
New cards
HoneyPot
Which defensive tool will attract attacks away from other network devices?
29
New cards
Firewall
Which defensive tool will block packets and is similar to a gate guard?
30
New cards
Promiscuous
A protocol analyzer works by setting the NIC to accept and process all packets crossing the network. This NIC setting is called \___________________________ mode.
31
New cards
Stateful Packet Firewall
What kind of firewall will maintain a record of the current state of each connection, blocking packets that are not consistent with the known state?
32
New cards
false positive
A \__________________________ is when an IDS generates an alarm on "normal" traffic that is actually not malicious or suspicious.
33
New cards
Application-proxy
A \________________________ firewall will provide inspection at layer 7 of the OSI model.
34
New cards
SNORT
What is the name of a popular network IDS system?
35
New cards
HIDS (host-based intrusion detection system)
What type of IDS is installed to monitor system files?
36
New cards
Nessus, Nmap, Netcat
Name two brands of vulnerability assessment tools.
37
New cards
Backup
What is the best method to protect the system against Ransomware?
38
New cards
Install Updates
The single most important thing you can do to secure a system is:
39
New cards
Ask you if you want to install something or ask for admin credentials
What is UAC and what does it do?
40
New cards
Benchmarks
Before deciding on hardening procedures for your organization, it is a good idea to use \_____________________ as a reference for best practices.
41
New cards
Internet Settings, Updates, Spyware Protection, Virus Protection, Backup, Firewall, UAC
List the items monitored by the Action Center
42
New cards
Service Pack
What is a bundle of one or more system fixes in a single product called?
43
New cards
Certificate Authority
When creating a certificate in PKI, a trusted 3rd party is used to vouch for the identity of the person or enterprise. What is this 3rd party called?
44
New cards
Public Key
What must a user submit to a trusted CA when applying for a certificate?
45
New cards
To prevent the sender or the receiver from denying that the communication between them has occurred.
What is the general purpose that nonrepudiation performs?
46
New cards
Rhindel
What algorithm does AES use?
47
New cards
Integrity
\____________________________ is the assurance that a message has not been altered in transit.
48
New cards
Symmetric Cryptography
Key distribution is the primary disadvantage of what kind of cryptography?
49
New cards
One Time Pad Encryption
What is the only unbreakable form of encryption?
50
New cards
message integrity and non-repudiation
What two assurances are provided by a digital signature?
51
New cards
Asymmetric Encryption
Speed is the primary disadvantage of what type of encryption?
52
New cards
public key
If Bob wants to send an encrypted email to Alice, what will Bob need in order to encrypt the message so that Alice will be able to decrypt it?
53
New cards
Transitive Access
When an attacker gets control of one computer and uses that access to pivot into an attack on another computer, this is called \__________________.
54
New cards
Polymorphic
What kind of malicious code is designed to change just enough so that it doesn't match any antivirus signature and will not be detected?
55
New cards
Botnet
A network of machines controlled by a malicious user is a \_____________.
56
New cards
To perform sniffing in a switched network
What is a spanning port used for?
57
New cards
ARP cache poisoning
A malicious user has launched an attack to implement a Man-in-the-Middle attack in a switched LAN. What technique is the malicious user MOST likely using?
58
New cards
your domain name server is resolving the domain name to the wrong IP address and thus misdirecting Internet traffic
What effect will a DNS Poisoning attack have?
59
New cards
DDoS
A \_______________________ is a coordinated attack launched from multiple zombie machines in attempt to create a traffic spike and bring down a service.
60
New cards
Solution for Syn Flood
Reduce the waiting time for the final ACK
61
New cards
Solution for Hijacking
Encrypt entire transmission
62
New cards
Solution for MITM
Disable zone transfers
63
New cards
Solution for Smurf Attack
Turn off ICMP protocol
64
New cards
Solution for IP Spoofing
Ingress Filtering
65
New cards
Solution for Unintentional Dos from high traffic
Redundant Servers
66
New cards
Ennumeration
\________________ \= identify specific computers in the network and try to find details such as services, hostnames, usernames and file shares.
67
New cards
ext:
When performing a Google search, which advanced operator can be used instead of filetype?
68
New cards
Host Discovery
The output in the image is the result of which nmap scan?
69
New cards
Vulnerabilities
The MITRE corporation maintains the CVE database which is a resource for looking up \_______________________.
70
New cards
IP addresses + FQDN of all network devices
A DNS zone transfer will provide what info to an attacker?
71
New cards
Xmas Scan
An nmap scan that sets all possible flags is:
72
New cards
MD5, SHA-1, etc
Name two hashing algorithms
73
New cards
user only has to provide her credentials once
What advantage does Single Sign-on have as a method of authentication?
74
New cards
One time password
What type of authentication provides the best protection against an intercepted password?
75
New cards
Birthday Attack
What type of network attack attempts to capture two different messages that use the same hash function to generate the same message digest?
76
New cards
dictionary attack
What type of attack utilizes a database to guess a password for computer or network access?
77
New cards
Biometrics
Which authentication technique measures physical characteristics that can be automatically verified?
78
New cards
Minimum 8 characters, including alphanumerics, mixed case and punctuation.
What is the best criteria to create a strong password?
79
New cards
have, are, know
What are the three "something you" that can be used for authentication?
80
New cards
UDP
Packets that do NOT need reliability will use this "carrier" protocol \____________
81
New cards
default gateway
A host device must be configured with a \_________________ so that it can send packets outside of the Local Area Network.
82
New cards
ARP
What protocol is used when you have an IP address and you need to know its corresponding MAC address?
83
New cards
SYN, SYN/ACK, ACK
What is the correct sequence for the TCP Three Way Handshake?
84
New cards
ICMP
What protocol provides error reporting in TCP/IP and is used by the PING command ?
85
New cards
DNS
What protocol is responsible for resolving a FQDN (Fully Qualified Domain Name) to the IP address?
86
New cards
Port 80
Which port must you close on a firewall to prevent users from browsing the Internet?
87
New cards
255.0.0.0
What is the default subnet mask for a Class A address?
88
New cards
APIPA (Automatic Private IP Addressing)
A computer has an IP address of 169.254.1.37 how was this address assigned?
89
New cards
Hub
When a message comes into a port on a \_____________, it goes out every other port and the message is delivered to every attached device.
90
New cards
8 bits
How many bits are there in a byte?
91
New cards
DHCP
What protocol can be used to automatically assign IP address configuration to host computers?
92
New cards
Class A IP Addresses
0-127
93
New cards
Class B IP Addresses
128-191
94
New cards
Class C IP Addresses
192-223
95
New cards
Only the affected link will stop working.
If one of the links to a computer on a star topology is severed, what will be the result?
96
New cards
OSCP (Online Certificate Status Protocol)
Verify status of a certificate in real time
97
New cards
CRL (Certificate Revocation List)
Verify status of a certificate
98
New cards
Key Escrow
Backup of keypair
99
New cards
SSL (Secure Sockets Layer)
Secure online protocol
100
New cards
M of N Control
Break the key pair up into pieces