WGU D315 STUDY GUIDE SECTION 2
EXAM QUESTIONS & VERIFIED
CORRECT ANSWERS
SecOps
· Combines IT operations and security to improve an organization's cyber resiliency
Vulnerability
A location in a system most likely to be penetrated or exploited
Zero-day Vulnerability
A vulnerability typically unknown to the vendor and for which no patch or fix is available. The
vendor has 0 days to prepare a patch as the vulnerability is already known and exploited.
Database Control Attack
SQL Injection. Buffer overflow (Similar to SQL Injection, but they enter too much information
into the former, causing the app to crash or other damage).
Spoofing Attack
Man-In-the-Middle, VLAN Hopping (attacking network resources on a VLAN. An attacking host
on a VLAN gains access to traffic on other VLANS that wouldn't normally be accessible)
, Denial of Service Attack
Denying service to a computer, network, or network server by overwhelming the victim with
large amounts of useless traffic. A computer is used to flood a server with TCP and UDP packets.
Ping of Death Attack
Attacker pings the target and sends an ICMP packet over the max of 65,535 bytes and causes
the victim's system to crash or stop functioning. Causes bumper overflow and crashes.
Ping Flood (Starts with Ping Sweep) Attack
Information gathering technique used to identify live hosts by pinging them. After the sweep
the attacker overwhelms the victim's computer with a large amount of ICMP echo-request
packets (pings).
SMURF DD0S (Distributed Attack)
Rather than one computer sending ICMP packets, multiple computers are replying to the ICMP
packet. Spoofs the source address for all ICMP packets.
DEAUTH Attack
Deauthentication, DoS attack where the attacker can force any or all off the network.
Exploit Attack (RPC)
EXAM QUESTIONS & VERIFIED
CORRECT ANSWERS
SecOps
· Combines IT operations and security to improve an organization's cyber resiliency
Vulnerability
A location in a system most likely to be penetrated or exploited
Zero-day Vulnerability
A vulnerability typically unknown to the vendor and for which no patch or fix is available. The
vendor has 0 days to prepare a patch as the vulnerability is already known and exploited.
Database Control Attack
SQL Injection. Buffer overflow (Similar to SQL Injection, but they enter too much information
into the former, causing the app to crash or other damage).
Spoofing Attack
Man-In-the-Middle, VLAN Hopping (attacking network resources on a VLAN. An attacking host
on a VLAN gains access to traffic on other VLANS that wouldn't normally be accessible)
, Denial of Service Attack
Denying service to a computer, network, or network server by overwhelming the victim with
large amounts of useless traffic. A computer is used to flood a server with TCP and UDP packets.
Ping of Death Attack
Attacker pings the target and sends an ICMP packet over the max of 65,535 bytes and causes
the victim's system to crash or stop functioning. Causes bumper overflow and crashes.
Ping Flood (Starts with Ping Sweep) Attack
Information gathering technique used to identify live hosts by pinging them. After the sweep
the attacker overwhelms the victim's computer with a large amount of ICMP echo-request
packets (pings).
SMURF DD0S (Distributed Attack)
Rather than one computer sending ICMP packets, multiple computers are replying to the ICMP
packet. Spoofs the source address for all ICMP packets.
DEAUTH Attack
Deauthentication, DoS attack where the attacker can force any or all off the network.
Exploit Attack (RPC)