Chapter 14 Flashcards

1
Q

It prevents users from accessing the network and/or its resources. p474

A

Denial of Service (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Ping of Death p474

A

Ping of Death attack, a humongous ICMP packet is sent to the remote host victim, totally flooding the victim’s buffer and causing the system to reboot or helplessly hang there, drowning.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It’s a version of a DoS attack that floods its victim with spoofed broadcast ping messages. p477

A

Smurf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Its also a DoS attack that inundates the receiving machine with lots of meaningless packets. p478

A

SYN Flood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What’s Stacheldraht p478

A

This is actually a mélange of techniques that translates from the German word for barbed wire. It basically incorporates TFN and adds a dash of encryption to the mix.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is IP Spoofing p481

A

is the process of sending packets with a fake source address that makes it look like those packets actually originate from within the network that the hacker is trying to attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a Brute-Force Attacks p482

A

is another software-oriented attack that employs a program running on a targeted network that tries to log in to some type of shared network resource like a server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does Viruses do. p484

A

A key trait of viruses is that they can’t replicate themselves to other computers or systems without a user doing something like opening an executable attachment in an email to propagate them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

attacks executable application and system program files like those ending in .COM, .EXE, and .DLL. p485

A

File Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

one that affects both the boot sector and files on your computer, making such a virus particularly dangerous and exasperatingly difficult to remove. p486

A

Multipartite Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

is basically a script of commonly enacted commands used to automatically carry out tasks without requiring a user to initiate them. pp486

A

Macro Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

work their way into the master boot record that’s essentially the ground-zero sector on your hard disk where applications aren’t supposed to live. p486

A

Boot-Sector Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

On-access scan An on-access scan runs in the background when you open a file or use a program in situations like these: p517

A

Insert a floppy disk or thumb drive
Download a file with FTP
Receive email messages and attachments
View a web page

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Before you initiate an on-demand scan, be sure that you have the oldest virus definitions. p517 T/F

A

False You must have the latest.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

is the process that an antivirus program deploys to examine a computer suspected of having a virus, identify the virus, and then get rid of it. p517

A

antivirus scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

is a virus scan initiated by you or an administrator that searches a file, a directory, a drive, or an entire computer but only checks the files you’re currently accessing. p517

A

on-demand scan

17
Q

I recommend doing this at least monthly, but you’ll also want to do an on-demand scan. p517

A

When you first install the antivirus software
When you upgrade the antivirus software engine
Any time you suspect a virus outbreak

18
Q

is the core program that runs the scanning process and virus definitions are keyed to an engine version number. p516

A

antivirus engine

19
Q

For your antivirus program to work for you, you’ve got to upgrade, update, and scan in a specific order: p516

A
  1. Upgrade the antivirus engine.
  2. Update the definition files.
  3. Create an antivirus emergency boot disk.
  4. Configure and run a full on-demand scan.
  5. Schedule monthly full on-demand scans.
  6. Configure and activate on-access scans.
  7. Make a new antivirus emergency boot disk monthly.
  8. Get the latest update when fighting a virus outbreak.
  9. Repeat all steps when you get a new engine.
20
Q

A typical antivirus program consists of two components: p515

A

The definition files

The engine

21
Q

Here are list of security procedure. p509

A

What to do when someone has locked themselves out of their account
How to properly install or remove software on servers What to do if files on the servers suddenly appear to be “missing” or altered
How to respond when a network computer has a virus
Actions to take if it appears that a hacker has broken into the network
Actions to take if there is a physical emergency such as a fire or flood

22
Q

Your network users need to have a clearly written document, called a ___________ that fully identifies and explains what’s expected of them and what they can and can’t do. p508

A

security policy

23
Q

security policies can cover literally hundreds of items. Here are some common ones: p505-07

A
Notification
Equipment access 
Wiring
Door locks/swipe mechanisms 
Badges
Tracking
Passwords
Monitor viewing
24
Q

The ICSA is a vendor-neutral organization that certifies the functionality of security products as well as makes recommendations on security in general. T/F p505

A

true

25
Q

What does Clean-Desk Policy mean. p504

A

it means requiring that all potentially important documents like books, schematics, confidential letters, notes to self, and so on aren’t left out in the open when someone’s away from their desk.

26
Q

What is a Security Audit. p504

A

A security audit is a thorough examination of your network that includes testing all its components to make sure everything is secure. You can do this internally, but you can also contract an audit with a third party if you want the level of security to be certified.

27
Q

So what exactly is a security policy. p504

A

it should precisely define how security is to be implemented within an organization and include physical security, document security, and network security.

28
Q

What is the order of volatility. p502

A
Memory content
Swap files
Network processes
System processes
File system information
Raw disk blocks
29
Q

This process may be initiated by a notice or communication from legal counsel to an organization. p503

A

Legal hold

30
Q

What is a Active Detection. p500

A

Is special software that searches for hackers attempting known attack methods and scans for the kind of suspicious activity and weird network traffic that hackers leave behind as they travel over the network.

31
Q

Is a software tool that can be incredibly effective in troubleshooting a problematic network but it can also be a hackers friend. p495

A

Packet Sniffers

32
Q

Programs that ping every port on the target to identify which ports are open. It does this by pinging the IP address of the target with the port number appended after a colon. p495

A

Port Scanners

33
Q

This attack requires a host machine the hacker has broken into and uses to redirect traffic that normally wouldn’t be allowed passage through a firewall. p495

A

Port-Redirection Attacks

34
Q

From simple invasions to elaborate Trojan horses villains can use their previously placed inroads into a specific host or a network whenever they want to. p494

A

Backdoors

35
Q

What is Bluejacking. p493

A

Is an attack aimed at bluetooth connections. It sends unsolicited messages to the devices. These messages are typically in the form of a vCard that contains the message in the name field.

36
Q

Is a network security standard that attempts to allow users to easily secure a wireless home network. It works by enabling the user to add a device to the network without typing credentials. p492

A

WPS Attacks

37
Q

An AP that is not under your control but is used to perform a hijacking attack. p492

A

Evil Twin

38
Q

These attacks allow access to the data on the device and make use of the pairing function used to connect two devices to transfer data between them. p493

A

Bluesnarfing

39
Q

Are miniature programs that run on a web server or that you download to your local machine. p494

A

ActiveX Attacks