Chapter 6 Flashcards

1
Q

ping flood

A

When an attacker attempts to send many ICMP echo request packets
(pings) to a host in an attempt to use up all available bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Smurf attack

A

A type of DoS that sends large amounts of ICMP echoes, broadcasting
the ICMP echo requests to every computer on its network or subnetwork.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fraggle

A

A type of DoS similar to the Smurf attack, but the traffi c sent is UDP echo
traffic as opposed to ICMP echo traffi c.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SYN flood

A

A type of DoS where an attacker sends a large amount of SYN request packets
to a server in an attempt to deny service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

flood guard

A

Security feature implemented on some firewalls to protect against SYN
floods and other fl ooding attacks. Also known as attack guards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ping of Death (POD)

A

A type of DoS that sends an oversized and/or malformed packet
to another computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

teardrop attack

A

A type of DoS that sends mangled IP fragments with overlapping and
oversized payloads to the target machine.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

permanent DoS (PDoS) attack

A

Generally consists of an attacker exploiting security
flaws in routers and other networking hardware by flashing the firmware of the device
and replacing it with a modified image.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

fork bomb

A

An attack that works by creating a large number of processes quickly to
saturate the available processing space in the computer’s operating system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

spoofing

A

When an attacker masquerades as another person by falsifying information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

TCP/IP hijacking

A

When a hacker takes over a TCP session between two computers
without the need of a cookie or any other type of host access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

man-in-the-browser (MITB)

A

Infects a vulnerable web browser and modifies online
transactions. Similar to MITM.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

watering hole attack

A

An attacker profiles which websites a user accesses and later
infects those sites to redirect the user to other websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

replay attack

A

An attack in which valid data transmission is maliciously or fraudulently
repeated or delayed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

nonce

A

A random number issued by an authentication protocol that can only be used
once.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

null session

A
When used by an attacker, a malicious connection to the Windows interprocess
communications share (IPC$).
17
Q

DNS poisoning

A

The modification of name resolution information that should be in a
DNS server’s cache.

18
Q

pharming

A

When an attacker redirects one website’s traffic to another bogus and possibly
malicious website by modifying a DNS server or hosts file.

19
Q

domain name kiting

A

The process of deleting a domain name during the fi ve-day grace
period and immediately reregistering it for
another fi ve-day period to keep a domain name indefi nitely and for free.

20
Q

ARP poisoning

A

An attack that exploits Ethernet networks, and it may enable an attacker
to sniff frames of information, modify that information, or stop it from getting to
its intended destination.