SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CISSP Attacks
Start Test
Study First
Subjects
:
certifications
,
it-skills
,
cissp
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. AKA: Asynchronous attack - How: Takes advantage of dependency of event timing in a multitasking OS - How: Attacker gets between instructions and manipulates something. Goal is Control the result.
Time of Use/Time of Check Attack
Wardialing
Bluetooth Threat Mitigation
Network Address Hijacking
2. Social engineering technique
Bluebugging
Phishing
Bluetooth Threat Mitigation
Bluetooth BackDoor Attack
3. Type: Brute force How: Attack hashing function via Brute force. Changes message until he gets one that produces the same hash value. - Why: Attacker wants to change your message without detection.
Network Address Hijacking
Birthday
ARP Spoof
Hijacking Tools
4. Allows skilled individuals to access phone Commands using Bluetooth wireless technology without notifying or alerting the phone's user. - Why: This vulnerability allows the hacker to initiate phone calls - send and read SMS - read and write phoneboo
Web Spoofing Attack
Stack Overflow
Network Address Hijacking
Bluebugging
5. Type: Buffer Overflow in the heap data area. - Heap overflows are exploitable in a different manner to that of stack-based overflows. Memory on the heap is dynamically allocated by the application at run-time and typically contains program data. Expl
Heap Overflow
Black Hole
S-RPC
Worm Names
6. AKA Session Hijacking - Enables user to gain control of session read change data and/or packets. Could potentially get passwords or Paswd file if attacks admin
Network Address Hijacking
Pharming
Phishing
TDL-4 Bot-Net #2
7. Hacker gains access to data stored on Bluetooth enabled phone. Why: hacker make phone calls - send & receive text messages - read & write phonebook contacts - eavesdrop on phone conversations - and connect to Internet. - How: requires advanced equip
Trinoo
Botnet Names
Cramming
Bluesnarfing
8. aka ARP Flooding - poisioning
ARP Spoof
Bluetooth BackDoor Attack
E-mail address spoofing
Slamming
9. Overwhelm mail server & Clients
Mail bombing
Birthday
Bluetooth DoS (1 or more attackers)
Botnet Names
10. Attacker uses program presenting Fake Logon Screen Capture Username & Pswd - Counter: Host IDS
Spoofing at Login
TDL-4 Bot-Net #3
Web Spoofing Attack
Network Address Hijacking
11. Covert Channel ICMP comms - writes data after header Sniffing - Counter: Secure protocols -
Shellcode
Wardialing
Port Scanning
Loki
12. 'Pairing' establishes trust relationship - Access to All Data on device
Web Spoofing Attack
Bluetooth DoS (1 or more attackers)
Buffer Overflow
Bluetooth BackDoor Attack
13. How: SMTP doesn't provide any authentication.E-mail address spoofing is done in quite the same way as writing a forged return address using snail mail. As long as the letter fits the protocol - (i.e. stamp - postal code) the SMTP protocol will send t
Bluetooth Malicious Threats
Mail bombing
E-mail address spoofing
ARP Table Poisioning
14. Type of Remote Shellcode that downloads and executes some form of malware on the target system. This type of shellcode does not spawn a shell - but rather instructs the machine to download a certain executable file off the network - save it to disk
Birthday
Teardrop
Download and Execute
Slamming
15. Attacker must win the race of responding between 2 different processes carrying out a task/function. Counter: Do not Split up critical tasks that can have results or sequence altered. - Employ Software locks to files to prevent unauthorized access.
Jamming
Race Condition
Black Hole
Scrubbing
16. Counters:Best: Proper programming with Input value bounds checking. Keep systems current: Patching - hot fixes - etc.
Cramming
Buffer Overflow
Bluetooth Malicious Threats
ARP Table Poisioning
17. Type: DDoS - How: uses a master program to communicate with attack agents across multiple nets. Attacker remotely connects to Master host - then master commands agents to perform UDP flood to a list of Target IP addresses. - Why: your IP address is i
Tribal Flood Network (TFN) & TFN2K
Scrubbing
Trinoo
Tap
18. Type: DDoS - How: TFN uses a master program to communicate with attack agents across multiple nets. TFN can launch several types of attacks simultaneously: UDP flood - TCP SYN flood - ICPM echo request flood and ICMP directed broadcasts. - Why: TFN M
Land
Network Address Hijacking
Deliberate exploit
Tribal Flood Network (TFN) & TFN2K
19. Flood w/ Pairing requests. (spoofed or not) - Victim consumed with Responses
Time of Use/Time of Check Attack
SMiShing
Cramming
Bluetooth DoS (1 or more attackers)
20. Uses DiffieH PK to determine shared Symm key
Ping of Death
Caller ID Spoofing
Buffer Overflow
S-RPC
21. Installs its rootkit on the MBR - Sector 0 - Invisible to OS & security software - advanced encryption and the use of a public peer-to-peer (P2P) network for the instructions issued to the malware by (C&C) servers
Pharming
TDL-4 Bot-Net
Spoofing at Login
Bluejacking
22. TDL-4's makers created their own encryption algorithm - Kaspersky's Golovanov said in his analysis - and the botnet uses the domain names of the C&C servers as the encryption keys.
Scrubbing
TDL-4 Bot-Net #2
Teardrop
Tribal Flood Network (TFN) & TFN2K
23. Change user's service provider - w/o concent
Land
Slamming
TDL-4 Bot-Net #3
Deliberate exploit
24. 1) If phone is vulnerable to bluesnarfing or bluebugging-- seek patches. Manufacturer or manufacturer-authorized dealer. Software patches available for many older Bluetooth phones. 2) Turn device to non-discoverable mode when not using Bluetooth tech
Botnet Names
Bluetooth Threat Mitigation
Download and Execute
Ping of Death
25. Juggernaut & HUNT Project - Spy then attack
Hijacking Tools
Bluejacking
Tribal Flood Network (TFN) & TFN2K
SMiShing
26. Counters: A firewall can be used to detect the outgoing connections made by connect-back shellcodes and the attempt to accept incoming connections made by bindshells. They can therefore offer some protection against an attacker - even if the system i
S-RPC
Remote Code
ARP Table Poisioning
Wardialing
27. Sasser - Blaster - Melissa - ILOVEYOU - Conflicker
Ping of Death
Tribal Flood Network (TFN) & TFN2K
Tap
Worm Names
28. Zeus - Mariposa - Storm
Botnet Names
Phishing
E-mail address spoofing
Bluetooth Threat Mitigation
29. May result in data at a specific location being altered in an arbitrary way - or in arbitrary code being executed. - Counter: make sure your OS and application libraries are patched to detect/prevent against these types of overflows
Tribal Flood Network (TFN) & TFN2K
TDL-4 Bot-Net #2
Wardialing
Deliberate exploit
30. Redirect victim to fake website - How: DNS poison -
Hijacking Tools
Tribal Flood Network (TFN) & TFN2K
Ping of Death
Pharming
31. Attacker deletes incriminating evidence or data from audit logs. - Countermeasure: Protect log from modification via strict access control
Buffer Overflow
Tap
Scrubbing
Slamming
32. In computer security - a shellcode is a small piece of code used as the payload in the exploitation of a software vulnerability. It is called 'shellcode' because it typically starts a command shell from which the attacker can control the compromised
Network Address Hijacking
Web Spoofing Attack
Shellcode
TDL-4 Bot-Net
33. Type: Buffer Overflow - How: Memory Stack is overflown to write data into another area of memory in the Identify of the System. (Priviledged System account) - Why: The most common cause of stack overflows is excessively deep or infinite recursion. T
SMiShing
Stack Overflow
Network Address Hijacking
Trinoo
34. Intruder re-routes data traffic from a network device to Attacker's machine
Bluetooth Malicious Threats
Black Hole
Network Address Hijacking
TDL-4 Bot-Net
35. Type: Worm. How: Self replicating usually Rapid over net or other means.
TDL-4 Bot-Net #2
Worms
Time of Use/Time of Check Attack
Cramming
36. Type: DoS - How: Send Packet > max allowable size of 65535 bytes - Why: Causes vulnerable host to fail and/or reboot - Counter: Ingress filter - patch systems
Ping of Death
Bluetooth Malicious Threats
Web Spoofing Attack
SMiShing
37. Bluebugging - Bluesnarfing
Time of Use/Time of Check Attack
Bluetooth Malicious Threats
Birthday
E-mail address spoofing
38. How: Attacker uses technologies (especially associated with VoIP) that allow callers to lie about their identity and present false names and numbers - Why: defraud or harass.
Worms
Caller ID Spoofing
Scrubbing
ARP Table Poisioning
39. Type: Reconn - How: Use port scanning tool to identify Listening Ports (TCP/UDP) on Servers - Tools: Nmap - Foundstone Products (Scanline - etc.) - Angry IP Scanner - etc.
Bluetooth BackDoor Attack
TDL-4 Bot-Net #3
E-mail address spoofing
Port Scanning
40. Type: DoS (Flood or Crashing) - How: Malformed fragmented packts - Why: Causes vulnerable host to fail and/or reboot - Countermeasure: Network IDS - drop faulty or corrupted packets - ingress filters
Loki
Bluetooth Threat Mitigation
TDL-4 Bot-Net
Teardrop
41. Counter: Non-public #s - Tight AC for modems / pools
TDL-4 Bot-Net #3
Wardialing
Tribal Flood Network (TFN) & TFN2K
Bluebugging
42. How: Attacker sends forged stream of TCP SYN packets with Source & Destination = to victim's IP address - Victim's system attempts to reply to itselft (attacks itself) - Vulnerable systems: Systems with BSD TCP/IP stack - Counter: Edge routers drop p
Spoofing at Login
Time of Use/Time of Check Attack
Land
Botnet Names
43. Add extra bogus charges
Bluebugging
Cramming
Phishing
Loki
44. RF interference / blocking
Heap Overflow
Bluetooth Threat Mitigation
Web Spoofing Attack
Jamming
45. Type: Man-in-Middle Attack - AKA: Phishing - URL Spoofing - How: Spoofs the public key of web site/server - Why: Get users to go to Attackers Website instead - Goal: usually to get user's data (ID - password - bank account info - etc.) However - coul
Port Scanning
Web Spoofing Attack
Botnet Names
E-mail address spoofing
46. Completed by using commercially available couplers to place a microbend in the cable to allow light to radiate through the cladding and be exposed to a photodetector. photodetector is connected to an electro-optical converter that acts as an interfac
Download and Execute
Port Scanning
Tap
Wardialing
47. Type: DoS - How: Attacker sends your packets to a non-existent address - How: One way is special type of ARP poisioning.
Heap Overflow
Black Hole
Land
Bluetooth Malicious Threats
48. Type: Fun or Snoop Info - How: Attacker sends unsolicited message to Bluetooth enabled device. e.g. insert contact into address book. Why: May Enable future attacks on the device via emails - Recipent reaction or get data w/o your knowledge while con
TDL-4 Bot-Net
Bluejacking
TDL-4 Bot-Net #2
Cramming
49. The botnet also uses the public Kad P2P network for one of its two channels for communicating between infected PCs and the C&C servers - said Kaspersky. Previously - botnets that communicated via P2P used a closed network they had created.
Phishing
Trinoo
TDL-4 Bot-Net #3
TDL-4 Bot-Net
50. Type: Masquerading Attack - How: For a given IP address in ARP table - attacker enters his MAC address - Why: Attacker alters System ARP table. Goal to receive packets.
Time of Use/Time of Check Attack
Web Spoofing Attack
ARP Table Poisioning
Download and Execute