Study sets, textbooks, questions
Upgrade to remove ads
1.0 Attacks, Threats, and Vulnerabilities
CompTIA Security + 601
Terms in this set (21)
DNS amplification attack
An application attack that targets vulnerabilities in the headers and payloads of specific application protocols. It triggers a short request for a long response at the victim network.
hides or replaces legitimate scripting with other malicious commands. For example, Invoke-Command cmdlet can run separate binary shellcodes.
Man-in-the-middle (MITM) attack
typically focused on public key cryptography. The attacker can alter and impersonate both parties in between a server and a client.
Dynamic Link Library (DLL) injection
deployed with malware that is already operating on the system with local administrator or system privileges.
using code that intercepts and redirects calls to enable legacy mode exploiting the Windows Application Compatibility framework for DLL injections.
Pass the hash
Credential exploit technique. It harvests an account's cached credentials in a Single Sign-On (SSO) system and reuses the hash to authenticate to network protocols such as Server Message Block (SMB).
the code performs the same function by using different methods, such as changing its signature
A start-up company operates all of its web servers and services on a cloud platform using Platform as a Service (PaaS). The company offices run a local domain controller for directory services. Which type of attacks would the cloud service provider consider as cloud-based attacks as opposed to on-premise?
- RAT on web servers
- Backdoor to virtual platforms
Which of the following are deployed similarly to a credit card skimmer?
Malicious USB plug
A foreign country is planning to target another country to destabilize its economy and upcoming elections. A hacktivist group and government leaders are working together using hybrid warfare tactics to accomplish their goal. What are the most effective methods the foreign country can use to carry out their plan?
- Soft power
- Fake tweets
the practice of spying on another country
using diplomatic and cultural assets to achieve an objective. This can influence the operations of companies and or organizations in the target country to assist with hybrid warfare.
Where might one find operating system files during acquisition?
- Random-access memory (RAM)
Application Programming Interfaces (APIs) allow consumers to automate tasks on a web or cloud resource. Ineffective secrets management could compromise these services on a wide scale if the threat actor retrieves API keys.
A phishing attack that automatically redirects the user to a fake site.
A virus that can change its own code or periodically rewrites itself to avoid detection
Security content automation protocol (SCAP) allows compatible scanners to compare computers with which of the following?
Security content automation protocol (SCAP)
allows compatible scanners to determine whether a computer meets a configuration baseline. The Extensible Configuration Checklist Description Format (XCCDF) audits for best-practice configuration checklists and rules.
used to monitor social media for incidents, such as disgruntled consumers posting negative content. In terms of security, this can be used to gather threat intelligence.
useful in gathering security related news and other information from a variety of industry sources.
Sets with similar terms
Security Plus: Chapter 2
Info Sec - Ch 15
Security+ Attack Types and Terms!!
CISSP - Types of Attacks and Viruses
Other sets by this creator
2.0 Architecture and Design
Performance Based Questions
4.0 Operations and Incident Response
Other Quizlet sets
MS Learners Permit
Haircare Final 16,20,21
Der Erste Weltkrieg und die deutsche Revolution (1…
Chapter 1 - Endurance Permit Practice Test Part 1