Chapter 3 Flashcards
(260 cards)
In a sniffing attack the attackers often use a:
protocol analyzer to capture data sent over a network. After capturing the data, attackers can easily read the data within the protocol analyzer when it has been sent in cleartext
A denial-of-service (DoS) attack is a:
service attack from a single source that attempts to disrupt the services provided by another system.
A distributed denial-of-server (DDoS) attack includes:
multiple computers attacking a single targer
A poisoning attack attempts to:
corrupt the data stored in cache for temporary access to with different data
Transmission Control Protocol (TCP) provides:
connection-oriented traffic (guaranteed delivery)
Transmission Control Protocol (TCP) uses:
a three-way handshake process
The TCP three-way handshake process is:
the client sends a SYN (synchronize) packet
the server responds with a SYN/ACK (synchronize/acknowledge) packet
the client completes the third part of the handshake with an ACK packet to establish the connection
User Datagram Protocol (UDP) provides:
connectionless sessions (W/O a three-way handshake)
The Internet Protocol (IP) identifies:
hosts in a TCP/IP network and delivers traffic from one host to another using IP addresses
Internet Control Message Protocol (ICMP) is used for:
testing basic connectivity and includes tools such as ping, pathping, and tracert
Many DoS attacks use:
ICMP
Because of how often ICMP is used in attacks:
it has become common to block ICMP at firewalls and routers, which disables a ping response
Blocking ICMP prevents:
attackers from discovering devices in a network
Address Resolution Protocol (ARP) resolves:
IPv4 addresses to media access control (MAC) addresses.
Media Access Controls (MACs) are also called:
physical addresses, or hardware addresses
Once a packet gets to a destination network it uses:
the MAC address to get it to the correct host
TCP/IP uses the:
IP address to get a packet to a destination network
Address Resolution Protocol (ARP) poisoning attacks use:
ARP packets to give clients false hardware address updates and attackers use it to redirect or interrupt network traffic
Neighbor Discovery Protocol (NDP) performs:
autoconfiguration of device IPv6 addresses and discovers other IPv6 devices on the network such as the address of the default gateway
UDP is commonly used instead of TCP as the underlying protocol with:
voice and video streaming
The Real-time Transport Protocol (RTP) delivers:
audio and video over IP networks. This includes VoIP, communications, streaming media, video teleconferencing applications, and devices using web-based push-to-talk features
The Secure Real-time Transport Protocol (SRTP) provides:
encryption, message authentication, and integrity for RTP
Secure Real-time Transport Protocol (SRTP) helps:
protect the confidentiality of data from these attacks while also ensuring the integrity of the data transmissions.
Secure Real-time Transport Protocol (SRTP) protects against:
replay attacks