chapter 14 Flashcards Preview

Network+ > chapter 14 > Flashcards

Flashcards in chapter 14 Deck (21):
1

Denial of service( DoS)
474

DoS prevents users from accessing network and resources.

2

what are some of DoS ?
474

The Ping of death
unreachable gateway
distributed DoS DDos

3

A ping of death?
474

sending a humongous ICMP packet to a remote host victim

4

distributed DoS DDos?
475

is a type of DOS attack where multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing a Denial of Service (DoS) attack.

5

botnet
475

is a group of programs connected on the internet for the purpose of performing a task in a coordinated manneer.

6

botnet
475

is a group of infected computers that are under the control of one or more individuals. The infected computers are used to perform tasks impossible for a single computer, such as distributing millions of SPAM e-mail's or a Distributed Denial of Service (DDoS) attack.

7

Traffic spike is _____
476

is one of DDoS attack is a major spike in traffic in the network

8

we recognize the traffic spike using what?
476

a network intrusion detection system ( IDS)

9

A smurf
477

it is a vertion of a DoS attack tat flood it's victim with spoofed broadcast ping messages.

10


how does smurf work?












477

-smurf involves stealing someone IP address.
-A smurf attack refers to a malicious network attack on a computer with the end-goal of rendering the victim's computer unusable. An attacker does this attack by creating a spoof, or virtual copy, of a victim's IP address and broadcasts that IP address by attaching the victim's IP address to a broadcast IP address. Once the victim's IP address is broadcasted, most networked devices respond to the IP address by sending a data packet back to the source from which the broadcast came. Therefore, if an attacker is broadcasting a victim's IP address, all of the replies can become so overwhelming that they render a victim's computer inert.

11

permanent DoS attack



477

known as Phlashing is a permanent denial of service (DoS), it attack that firmware located in many systems.

12

SYN flood





478

Alternatively referred to as an SYN flood, an SYN attack is a Denial of Service (DOS) attack on a computer or network. It is carried out by flooding the network with spoofed SYN packets or packets that contain an address that never responds to the SYN/ACK requests. Essentially, the connection queues fill up with bad connections, and service is denied to legitimate users.

13

Stacheldraht

478

is a program that can be used to perpetrate several different DDoS attacks

14

A DNS amplification attack



479

A DNS amplification attack is a form of reflection attack, The attacker spoofs look-up requests to domain name system (DNS) servers to hide the source of the exploit and direct the response to the target.

15

NTP reflection attack:
479

the attacker and his bots sends a small spoofed 8 byts UDP to NTP servers that requests a large amount of data to be sent to the target IP.

16

the NTP attack can be prevented using which version of NTP?
479

version 4.2.7

17

ARP cache poisoning
480

the cache can be poisoned by pinging a device with incorrect IP address

18

Brute Force:
482

is a form of a password attack

19

how to prevent a brute force attack?
482

setting an account lockout policy , that is going to lock up the account after a number of failed attemps.

20

VLAN hopping




482

a method of attacking networked resources on a Virtual LAN (VLAN). The basic concept behind all VLAN hopping attacks is for an attacking host on a VLAN to gain access to traffic on other VLANs that would normally not be accessible.

21

what is Double tagging?


482

Double tagging is a method involves tagging transmitted frames with two 802.1q headers, one of the headers is used for Victim switch and another is used for the attacker's switch.