Attacks Flashcards

1
Q

Sniffing

A

hjk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Man in the Middle

A

hjk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DoS

A

hjk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Smurf

A

hjk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Fraggle

A

hjk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SYN Flood

A

hjk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Broadcast Storms

A

hjk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ping of Death

A

hjk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Dial Tone

A

hjk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

War Driving

A

hjk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Evil Twin

A

hjk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Bluesnarfing

A

hjk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Bluejacking

A

hjk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DDoS

A

hjk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Replay/Playback

A

hjk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Brute Force

A

hjk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Malicious Port Scanning

18
Q

Backdoor 1

A

provides another way of accessing a system

19
Q

Backdoor 2

20
Q

Virus

A

A set of malicious code that attaches itself to a host application. Once the host application is executed, the malicious code executes as well. (Chapter 6)

21
Q

Worm

A

a self-replicating malware that resides in memory. It uses different transport protocols to travel over the network and consumes network bandwidth.

22
Q

Trojan Horse

A

appears to be something useful but includes a malicious component, such as installing a backdoor on a system. Many Trojans are delivered via drive-by downloads.

23
Q

Ransomeware

A

A type of Trojan. Attackers take control of a user’s computer and then demands a ransome

24
Q

Logic Bomb

A

a string of code embedded into an application/script that executes in response to an event.

25
Rootkit
A group of programs that hides the fact that the system has been infected or compromised by malicious code.
26
Malformed MIME
hjk
27
Pharming
hjk
28
Transitive Attack
hjk
29
Social Engineering
social tactics to trick users into giving up info or performing actions they wouldn't normally take.
30
Typosquatting
hjk
31
Watering Hole Attack
hjk
32
Piggybacking/Tailgating
the practice of one person following closely behind another without showing credentials
33
Tracking Cookie
hjk
34
Phishing
the practice of sending email to users with the purpose of tricking them into revealing personal info or clicking on a link. (Malicious Spam)
35
Whaling
form of spear phishing that attempts to target high-level executives (C Level).
36
Vishing
an attack using the phone system to trick users into giving up personal and financial information
37
Botnet
Robot Network: includes multiple computers that act as robots and function together in a network for malicious purposes.
38
Spam
unwanted or unsolicited email
39
Spear Phishing
a targeted form of phishing.
40
Spim
a form of spam using instant messaging