Module 03: Threats and Attacks on Endpoints

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What is true of a zeroday exploit

- A zero-day vulnerability can only be discovered when the software is deployed. Before the deployment, since the software is not ready and rolled out, it is impossible to discover the zero-day vulnerability. - A zero-day vulnerability can be an example of an unknown threat. Unknown to the organization, the vulnerability may be present in the organization's operating systems or applications. - A zero-day attack is impossible to detect as it exploits the unknown vulnerabilities

What is the difference between a Trojan and a RAT?

A RAT gives the attacker unauthorized remote access to the victim's computer.

Structured Query Language

A ________________ used to view and manipulate data that is stored in a relational database.

Time of check/time of use race condition

A flaw that results in a pointer given a NULL instead of valid value. this is called a pointer/object dereference

eXtensible Markup Language (XML)

A markup ________________ designed to store information.

improper input handling

A programming error that does not filter or validate user input to prevent a malicious action.

error handling

A programming error that does not properly trap an __________ condition.

tainted training data for machine learning

A risk associated with attackers can attempt to alter the training data that is used by ML.

security of the ML algorithms

A risk associated with the vulnerabilities in AI-powered cybersecurity applications and their devices.

race condition

A situation in software that occurs when two concurrent threads of execution access a shared resource simultaneously.

memory leak

A situation that occurs when, due to a programming error, memory is not freed when the program has finished using it.

time of check/time of use

A software check of the state of a resource before using that resource.

command and control (C&C)

A structure that sends instructions to infected bot computers.

fileless virus

A type of malware that takes advantage of native services and processes that are part of the OS to avoid detection and carry out its attacks.

the link to the device platform that allows a developer to access resources at a higher level.

API (Application Programming Interface)

resource exhaustion attacks

An ____________ that depletes parts of memory and interferes with the normal operation of the program in RAM to give an attacker access to the underlying OS.

application program interface (API) attack

An ____________ that targets vulnerabilities in an ______.

device driver manipulation

An attack that alters a device driver from its normal function.

integer overflow attack

An attack that changes the value of a variable to something outside the range that the programmer had intended by using an integer overflow.

replay

An attack that copies data and then uses it for an attack.

DLL injection

An attack that inserts code into a running process through a ______ to cause a program to function in a different way than intended.

SQL injection

An attack that inserts statements to manipulate a database server using Structured Query Language commands.

XML injection

An attack that inserts statements to manipulate a database server using eXtensible Markup ________________ (XML).

buffer overflow attack

An attack that occurs when a process attempts to store data in RAM beyond the boundaries of a fixed-length storage buffer.

server-side request forgery (SSRF)

An attack that takes advantage of a trusting relationship between web servers.

cross-site scripting (XSS)

An attack that takes advantage of a website that accepts user input without validating it.

client-side request forgery

An attack that takes advantage of an authentication "token" that a website sends to a user's web browser to imitate the identity and privileges of the victim.

cross-site request forgery (CSRF)

An attack that takes advantage of an authentication "token" that a website sends to a user's web browser to imitate the identity and privileges of the victim.

Trojan

An executable program that masquerades as performing a benign activity but also does something malicious.

bot

An infected computer (sometimes referred to as a zombie) placed under the remote control of an attacker for the purpose of launching attacks.

A client calls you about a message that suddenly appeared on their screen that says the software license has expired and they must immediately pay $500 to have it renewed before control of the computer will be returned to them. What type of malware has infected their computer?

Blocking ransomware

Password spraying cyber-attack can be categorized as which kind of attack?

Brute-force

Which type of attack occurs if an application overruns the allocated buffer boundary and writes to adjacent memory locations?

Buffer Overflow

Which type of memory vulnerability attack manipulates the "return address" of the memory location of a software program?

Buffer overflow attack

Which of the following attacks is based on the principle that when a user is currently authenticated on a website and then loads another webpage, the new page inherits the identity and privileges of the first website?

CSRF

refactoring

Changing the design of existing code.

logic bomb

Computer code that is typically added to a legitimate program but lies dormant and evades detection until a specific logical event triggers it.

Which of the following enables attackers to inject client-side scripts into web pages viewed by other users?

Cross Site Scripting

types of files that can be infected by malware include:

DOCX or XLSX Microsoft Office user documents EXE Executable program file MSI Microsoft installer file MSP Windows installer patch file SCR Windows screen saver CPL Windows Control Panel file MSC Microsoft Management Console file WSF Windows script file PS1 Windows PowerShell script

An application lists all the files and subdirectories in its web folder. This indicates which of the following weaknesses on the application?

Directory Listing

Which of the following attacks targets the external software component that is a repository of both code and data?

Dynamic-link library (DLL) injection attack

Which is NOT a means by which a bot communicates with a C&C device?

Email (not totally true)

Which of the following attack type confirms the vulnerability by revealing database-specific exceptions or error messages to the end-user or attacker?

Error Based SQL Injection

adversarial artificial intelligence

Exploiting the risks associated with using AI and ML in cybersecurity.

True or False: AI learns on its own without any input data

False

True or False: An SSRF takes advantage of a trusting relationship between a web browser and web servers.

False

True or False: Software keyloggers are generally easy to detect.

False

True or false: It is a common tactic for cryptomalware attackers to not send the decryption key after the ransom has been paid.

False

True or false: c. A recognized subset of ML is AI.

False

keylogger

Hardware or software that silently captures and stores each keystroke that a user types on the computer's keyboard.

Which of the following provides unauthorized access to another user's system resources or application files at the same level/role within an organization?

Horizontal Privilege Escalation

Which of the following would NOT be something distributed by a botnet?

LOLbins

worm

Malicious program (sometimes called network viruses) that uses a computer network to replicate

Malware

Malicious software that enters a computer system without the user's knowledge or consent and then performs an unwanted and harmful action.

rootkit

Malware that can hide its presence and the presence of other malware on the computer.

cryptomalware

Malware that encrypts all the files on the device so that none of them can be opened until a ransom is paid.

backdoor

Malware that gives access to a computer, program, or service that circumvents any normal security protections.

remote access Trojan (RAT)

Malware that infects a computer like a ____________ but also gives the threat agent unauthorized remote access to the victim's computer by using specially configured communication protocols.

Ransomware

Malware that prevents a user's endpoint device from properly and fully functioning until a fee is paid.

software apps installed on a device before the purchase are known as:

PUP (Potentially unwanted programs

Which of the following is also known as a "dot dot slash" attack?

Path Traversal

Programs that fileless viruses attach themselves to include:

PowerShell A cross-platform and open source task automation and configuration management framework Windows Management Instrumentation (WMI) A Microsoft standard for accessing management information about devices .NET Framework A free, cross-platform, open source developer platform for building different types of applications Macro A series of instructions that can be grouped together as a single command to automate a complex set of tasks or a repeated series of tasks, can be written by using a macro scripting language, such as Visual Basic for Applications (VBA), and is stored within the user document (such as in an Excel .xlsx workbook or Word .docx file)

Which malware type does not harm the system but only targets the data?

Ransomware

Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier which allows an attacker the opportunity to steal authenticated sessions, describes which of the following?

Session Hijacking

potentially unwanted programs (PUPs)

Software that users do not want on their computer.

Spyware

Tracking software that is deployed without the consent or control of the user.

shimming

Transparently adding a small coding library that intercepts calls made by a device and changes the parameters passed between the device and the device driver.

True or False: A USB can be used to drop almost all the types of malware

True, the malware A ______ can be used to drop includes, but is not limited to Trojans, Worms, Keyboard loggers, and Backdoors

Which of the following attacks is based on a website accepting user input without sanitizing it?

XXS

which windows versions has Microsoft stopped providing support services for?

______________ XP - stopped support on April 8, 2014 ______________ 7 - stopped support on January 14, 2020

Another category of attacks specifically targets software applications that are already installed and running on endpoints. These attacks look for vulnerabilities in the application or manipulate the application in order to compromise it. Why would they use this method to infect systems?

compromising _______________________s can provide many more potential victims than a single computer user; a single __________________________ could expose many other users who are accessing the application or web server.

Cybersecurity AI allows organizations to do the following:

detect, predict, and respond to cyberthreats in real time using ML

today every endpoint is a potential entry point because:

each ________________ is a target for attackers to attempt to steal or manipulate their data. And because the ________________s are connected to the network, a vulnerability on an ________________ can result in an attack that penetrates the network and infects all other endpoints.

classifying the diverse types of malware can be to examine the primary action that the malware performs and then group those together with similar actions. malware actions used for groupings are:

imprison, launch, snoop, deceive, and evade.

What is often the cause of Memory Vulnerabilities and malicious attacks launched to take advantage of how programs use RAM

poor techniques (or laziness) by the software developer.


Set pelajaran terkait

Accounting Final Multiple Choice Practice

View Set

Principles of Microeconomics Chapter 5,6,7,8.

View Set

The Declaration of Independence / 5 Principles

View Set

Exam 2: Chapter 30, 35, 36, 38: Cardiac Pulmonary

View Set

CompTIA Module 1-4 Review Questions

View Set

Understanding Business Chapter 11 Learn Smart

View Set