Attacks, Viruses And Threats Flashcards

1
Q

Attackers take control of the database by entering SQL into the input boxes on a website instead of entering basic text - application layer

A

SQL Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attackers enter too much information into the form which causes the app to crash or other damages. - application layer

A

Buffer overflow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Impersonates both the sender & the receiver to intercept communication between two systems. - Various Layers

A

Man in the Middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An attacking host on a VLAN gains access to traffic on other VLANs that would normally not be accessible. - Data Link Layer

A

VLAN Hopping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Denying service to a computer, network or network server by overwhelming the victim with large amounts of useless traffic. - Transport

A

Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Where multiple systems target a single system with a DoS attack. The targeted network is then bombarded with packets from multiple locations. - transport

A

Distributed Denial of Service - DDoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Attacker pings the target & send a ICMP packer over the max of 65,535 bytes and causes the victims system to crash or stop functioning. Causes buffer overflow and crashes - Network

A

Ping of Death

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Information gathering technique which is used to identify live hosts by pinging them. After the sweep, the attacker overwhelms them with a large amount of ICMP echo-request packets (ping) - Network

A

Ping Flood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Rather than one computer sending ICMP packets, multiple computers are replying to the ICMP packet. - network & transport

A

SMURF DDoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A DoS attack where the attacker can force any client or even every client off of the network. - Presentation

A

Deauthentication - Deauth Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

User clicks on a link to a nefarious site which tricks them into entering their name/email addresses or other secure info.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Targets a person with extremely specific information

A

Spear Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Attacks itself to a file or host

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Do not attach to a host file, they are self/contained programs.

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Hides in a useful program

A

Trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Malware hidden in a host’s file system, quite hard to detect.

A

Rootkits

17
Q

Blocks victim’s data – threatens to publish it, or delete it, unless a ransom is paid.

A

Ransomware

18
Q

Exploits a vulnerability in an OS software – refers to the fact that the exploit was released before security vendors can issue protection against them

A

Zero Day