cysa+ch4

pdf

School

Miami Dade College, Miami *

*We aren’t endorsed by this school

Course

1060C

Subject

Information Systems

Date

Apr 3, 2024

Type

pdf

Pages

2

Uploaded by DukeBuffalo3728

Report
CYSA+ Chapter 4 1. What is CVSS?: Common Vulnerability Scoring System. It provides a technique for scoring each vulnerability on a variety of measures. 2. Interpret the below CVSS vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N: Access Vector: Network Access Complexity: Medium Authentication: None Confidentiality: Partial Integrity: None Availability: None 3. Nessus low vulnerability score:: Under 4.0 4. Nessus medium vulnerability score:: 4.0 or higher, but less than 6.0 5. Nessus high vulnerability score:: 6.0 or higher, but less than 10.0 6. Nessus critical vulnerability score:: 10.0 7. What is a buffer overflow attack?: These occur when an attacker manipulates a program into placing more data into an area of memory than is allocated for that program's use. 8. How do you mitigate a buffer overflow vulnerability?: Find a patch that cor- rects the issue. 9. What is a privilege escalation attack?: An attack that seeks to increase the level of access that an attacker has to a target system. 10. What is an arbitrary code execution vulnerability?: A vulnerability that allows an attacker to run software of his or her choice on the targeted system. 11. How do you mitigate an arbitrary code execution attack?: Find a patch that corrects the issue. 12. What is FTP?: File Transfer Protocol. Provides the ability to transfer files be- tween systems but does not incorporate security features. 13. What is telnet?: A protocol that is used to gain command-line access to a remote server. It does not include any security features however. 14. What replacement for telnet is there?: SSH or Secure Shell. 15. What are the two replacements for FTP?: SFTP or Secure File Transfer Protocol and FTPS or FTP-Secure. 16. What does SSL do?: Secure Sockets Layer. It is a secure means of exchanging information over the Internet and across private networks. 1 / 2
CYSA+ Chapter 4 17. What does TLS do?: It is the replacement for SSL, and stands for Transport Layer Security. It offers a secure means to exchange information over the Internet and private networks. 18. What is DNS?: Domain Name System. It provides a translation between domain names and IP addresses. 19. What is a DNS amplification vulnerability?: A vulnerability wherein an attack- er sends spoofed DNS requests to a DNS server that are carefully designed to elicit responses that are much larger in size than the original requests. 20. What is a virtual machine escape vulnerability?: A vulnerability wherein the attacker has access to a single virtual host and then manages to leverage that access to intrude on the resources assigned to a different virtual machine. 21. What does SCADA stand for?: Supervisory Control and Data Acquisition systems. A member of the IoT device spectrum. 22. What is an ICS?: Industrial Control System. A member of the IoT device spec- trum. 23. What is an injection attack?: A type of attack wherein an attacker is able to send commands through a web server to a backend system, by passing normal security controls and fooling the backend system into believing that the request came from a web server. 24. What is an SQL injection attack?: A type of injection attack wherein the attacker exploits the web application to send unauthorized commands to a backend database server. 25. What is cross-site scripting?: Also called an XSS attack. It's when an attacker embeds scrpting commands on a website that will later be executed by an unsus- pecting visitor accessing the site. 2 / 2
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help