cysa+ch4
pdf
keyboard_arrow_up
School
Miami Dade College, Miami *
*We aren’t endorsed by this school
Course
1060C
Subject
Information Systems
Date
Apr 3, 2024
Type
Pages
2
Uploaded by DukeBuffalo3728
CYSA+ Chapter 4
1. What is CVSS?: Common Vulnerability Scoring System. It provides a technique for scoring each vulnerability on a variety of measures.
2. Interpret the below CVSS vector:
CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N: Access Vector: Network
Access Complexity: Medium
Authentication: None
Confidentiality: Partial
Integrity: None
Availability: None
3. Nessus low vulnerability score:: Under 4.0
4. Nessus medium vulnerability score:: 4.0 or higher, but less than 6.0
5. Nessus high vulnerability score:: 6.0 or higher, but less than 10.0
6. Nessus critical vulnerability score:: 10.0
7. What is a buffer overflow attack?: These occur when an attacker manipulates a program into placing more data into an area of memory than is allocated for that program's use.
8. How do you mitigate a buffer overflow vulnerability?: Find a patch that cor-
rects the issue.
9. What is a privilege escalation attack?: An attack that seeks to increase the level of access that an attacker has to a target system.
10. What is an arbitrary code execution vulnerability?: A vulnerability that allows an attacker to run software of his or her choice on the targeted system.
11. How do you mitigate an arbitrary code execution attack?: Find a patch that corrects the issue.
12. What is FTP?: File Transfer Protocol. Provides the ability to transfer files be-
tween systems but does not incorporate security features.
13. What is telnet?: A protocol that is used to gain command-line access to a remote server. It does not include any security features however.
14. What replacement for telnet is there?: SSH or Secure Shell.
15. What are the two replacements for FTP?: SFTP or Secure File Transfer Protocol and FTPS or FTP-Secure.
16. What does SSL do?: Secure Sockets Layer. It is a secure means of exchanging information over the Internet and across private networks.
1 / 2
CYSA+ Chapter 4
17. What does TLS do?: It is the replacement for SSL, and stands for Transport Layer Security. It offers a secure means to exchange information over the Internet and private networks.
18. What is DNS?: Domain Name System. It provides a translation between domain names and IP addresses.
19. What is a DNS amplification vulnerability?: A vulnerability wherein an attack-
er sends spoofed DNS requests to a DNS server that are carefully designed to elicit responses that are much larger in size than the original requests.
20. What is a virtual machine escape vulnerability?: A vulnerability wherein the attacker has access to a single virtual host and then manages to leverage that access to intrude on the resources assigned to a different virtual machine.
21. What does SCADA stand for?: Supervisory Control and Data Acquisition systems. A member of the IoT device spectrum.
22. What is an ICS?: Industrial Control System. A member of the IoT device spec-
trum.
23. What is an injection attack?: A type of attack wherein an attacker is able to send commands through a web server to a backend system, by passing normal security controls and fooling the backend system into believing that the request came from a web server.
24. What is an SQL injection attack?: A type of injection attack wherein the attacker exploits the web application to send unauthorized commands to a backend database server.
25. What is cross-site scripting?: Also called an XSS attack. It's when an attacker embeds scrpting commands on a website that will later be executed by an unsus-
pecting visitor accessing the site.
2 / 2
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help