Attacks Flashcards

(31 cards)

1
Q

DoS

A

Denial of Service attack. Prevents access to network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Varieties of DoS

A

Ping of Death, Smurf, SYN Flood, Tribe Flood Network, Tribe Flood Network 2000, Stacheldragt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ping of Death

A

Type of DoS. One Ping request sends a huge amount of data instead of the small payload PING normally carries. Most modern OSes prevent this from working.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Smurf

A

Type of DoS. Attacker spoofs the source IP of a PING request. Sends PING request to all broadcast addresses. Router forwards reuqests to all hosts on the subnet. Response pings are sent back to victim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SYN Flood

A

Type of DoS. Sending a TCP/IP packet with SYN flag set to 1 causes server to open a connection and respond with SYN/ACK, waiting for an ACK. Attacker doesn’t send ACK, forcing the server to keep the connection open, using a portion of memory. Server isn’t able to respond to legitimate requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Tribe Flood Network

A

Type of DoS. TFN. DDoS (Distributed Denial of Service) attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Tribe Flood Network 2000

A

Type of DoS. TFN2K. DDoS (Distributed Denial of Service) attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Stacheldraght

A

Type of DoS. Means barbed wire in German. Mix of techniques involving TFN and encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Types of Viruses

A

Macro Virus, Boot-Sector Virus, Multipartite Viruses File Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

File Virus

A

Replaces some of all of a target program’s code with their own. The compromised file, when executed, does the damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Macro Virus

A

Script of commands written in software that supports macros (EG MS Office). Annoying but harmless.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Boot-Sector Virus

A

Infect the hard drive’s boot sector, pointing the PC in the wrong direction or removing reference to the OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Multipartite Virus

A

Affects the boot sector and the hard drive’s files at once.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Worms

A

Like viruses, but can replicate without users opening an infected file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Buffer Overflow

A

Injecing so much data into the forms of an application that the host crashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

War Driving

A

The practice of cruising around in a vehicle equipped with laptops, antennas, and wireless adapters to detect unsecured or poorly secured Wi-Fi networks. The goal might be to map network locations, analyze signal strengths, or, in some cases, exploit vulnerabilities.

17
Q

War Chalking

A

The collection of information regarding wireless networks either in chalk on the sitewalk or online

18
Q

3 ways to detect and defend against an intruder

A

Active Detection, Passive Detection, Proactive Defense Methods

19
Q

Active Detection

A

This involves deliberately seeking out threats or unusual activity using tools or techniques that actively probe the environment.

Examples: Intrusion Detection Systems (IDS) like Snort that scan network traffic for malicious behavior, or port scanners that identify unauthorized open ports.

Pros: Real-time alerts and the ability to identify active threats quickly.

Trade-off: Can potentially alert intruders that you’re watching.

20
Q

Passive Detection

A

Here, you monitor systems and networks quietly without interacting with them directly. It’s more stealthy.

Examples: Packet sniffers like Wireshark, or security logs and audit trails that detect anomalies over time.

Pros: Less likely to tip off intruders, useful for discovering sophisticated or stealthy attacks.

Trade-off: May not catch fast-moving or zero-day threats immediately.

21
Q

Proactive Defense Methods

A

These are strategies or technologies used to prevent intrusions before they happen.

Examples: Firewalls, endpoint protection, multi-factor authentication, and security awareness training for users.

Pros: Reduces the attack surface and mitigates risk before breaches occur.

Trade-off: Needs constant updates and user compliance to remain effective.

22
Q

The Ping of Death and SYN floods are examples of what types of attack?

23
Q

How often should you update your virus definitions in your antivirus software?

A

You should update your virus definitions in your antivirus software as frequently as possible, ideally multiple times a day or whenever new updates are available

24
Q

What type of attack injects a command that overflows the amount of memory allocated and executes commands that would not normally be allowed?

A

Buffer Overflow

25
What type of virus attacks executable programs?
A File Virus
26
What kind of tool could a hacker use to intercept traffic on your network?
Packet Sniffer
27
What type of virus uses Microsoft’s Visual Basic scripting language?
A Macro Virus
28
What is it called when someone intercepts traffic on your network that’s intended for a different destination computer?
Man-in-the-middle attack
29
If someone installed a wireless router on your network without your knowledge, that would be called ___________________.
A rogue access point
30
What software application can help automatically ensure that your Windows-based computers have the most current security patches?
Windows Update For enterprise environments: Windows Server Update Services (WSUS) is the primary software application that can help automatically ensure Windows-based computers have the most current security patches. WSUS is a Microsoft server role that allows network administrators to centrally manage and distribute Windows updates across their network.
31
The two different types of virus scans are ___________________.
On-access (real-time) scanning – scans files as they are opened, saved, or executed. On-demand scanning – scans files or entire systems manually when initiated by the user.