Explain common network-related security threats Flashcards

(9 cards)

1
Q

What is eavesdropping in network security?

A

An eavesdropping attack, also known as network sniffing, occurs when a hacker captures network packets sent and received by workstations connected to the network.

Eavesdropping attacks can compromise sensitive data such as passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What can eavesdropping attacks lead to?

A

They can lead to other, more damaging attacks.

This is due to the compromise of sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a denial of service (DoS) attack?

A

A DoS attack limits the function of a network app or renders a network resource unavailable.

Hackers exploit vulnerabilities in the target app to initiate this type of attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How do hackers typically perform DoS attacks?

A

By overloading a service that replies to network requests with a large number of fake requests.

An example of such a service is the Domain Name System (DNS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a distributed denial of service (DDoS) attack?

A

A version of a DoS attack.

It involves multiple systems attacking a single target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is port scanning?

A

Port scanning is when attackers query hosts for open ports to identify services running on a computer.

Apps using TCP/IP protocol utilize TCP or UDP ports for this purpose.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What do attackers do once they identify an open port?

A

They can use other attack techniques to access the services running on the computer.

This can lead to further exploitation of the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a man-in-the-middle (MITM) attack?

A

A MITM attack occurs when a network attacker impersonates a legitimate host and intercepts communications between two hosts.

The attacker can view and modify the data in transit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the purpose of a man-in-the-middle (MITM) attack?

A

To intercept and potentially modify communications intended for a destination host.

This can lead to unauthorized access to sensitive information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly