U11 - Mod 4 Key Terms
Across
- 1. (4,9) Attackers execute commands on a web server’s OS through a vulnerable web application.
- 3. (4,7) typical a web attack where the victim unknowingly visits a web page that has been compromised by malware.
- 6. (11-5,5) Threat actors embed malicious content in business files such as an email from the IT department.
- 7. (3,4,8) answers queries from clients outside of its administrative domain and is vulnerable to multiple malicious activities
- 9. spoofing (5,9) Threat actors create email messages with a forged sender address that is meant to fool the recipient into providing money or sensitive information.
- 10. (9,6) This is an HTML element that allows the browser to load another web page from another source.
Down
- 2. (4,4,5,6) Threat actors take advantage of enterprise servers that are misconfigured as open mail relays to send large volumes of spam or malware to unsuspecting users.
- 4. Scripting (5-4,8) occurs when web pages that are executed on the client-side, within their own web browser, are injected with malicious scripts.
- 5. (4,7) Occur when a rogue server is connected to the network and provides false IP configuration parameters to legitimate clients.
- 8. (4,5) Threat actors send unsolicited email containing advertisements or malicious files.