2-2 Flashcards

1
Q

the code for a program or the act of programming as in to code an algorithm

A

code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a dos attack launched from multiple sources

A

distributed DOS or Ddos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a specialized type of DDoS that uses internet routers to perform the attack

A

distributed reflection denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

macking packets seem to come from a different IP address that they really originated from

A

ip spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

in reference to computer security models, an _____ is any file, device, or part of the system a user wishes to access

A

object

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

a Dos attack that sends a malfomed Ping packet hoping to cause the target machine to error out.

A

ping of death

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

a simple method for alleviating the danger of certain types of DOS attacks

A

RST cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the process of taking over the session between a client and a server in order to gain access to the service

A

session hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

a famous internet worm sounds like a home run

A

Slammer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

a specific type of DDOS attack that uses broadcast packets sent o the router on the target network

A

smurf attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

a program that captures data a it travels across a network

A

sniffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

pretending to be something else, as when a packet might spoof another return IP address or when a website spoofing a well known e-commerce site

A

spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

a complex method for protecting a system against Dos attacks. This method involves reconfiguring the OS to handle connections differently

A

stack tweaking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a type of firewall that not only examines packet but also knows the context within which the packet was sent

A

stateful packet inspection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

a method for ameliorating the dangers of syn floods

A

syn cookie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

sending a stream of syn packets and then never responding thus leaving the connection half open

A

syn flood

17
Q

software that appears to have a valid and benign purpose but really has another nefarious purpose

A

trojan horse