Lesson 14: Network Security Flashcards

(80 cards)

1
Q

Organizations must make sure that their staff does not send sensitive information outside the network.

A

Data Loss Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

It is a set of rules and
configurations designed to protect the integrity, confidentiality and
accessibility of computer networks and data using both software and hardware technologies.

A

Network Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

It is launched from a large number of other host
machines that are infected by malicious software controlled by the attacker.

A

Distributed denial-of-service (DDoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A type of malware that blocks access to the victim’s data and threatens to publish or delete it unless a ransom is paid.

A

Ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A program that hides in a useful
program and usually has a malicious function.

A

Trojans

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ACRONYM: DLP

A

Data Loss Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In this attack, an attacker exploits the use of the buffer space during a Transmission Control Protocol (TCP) session initialization handshake.

A

TCP SYN flood attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This attack causes the length and fragmentation offset fields in sequential Internet Protocol (IP) packets to overlap one another on the attacked host; the attacked system attempts to reconstruct packets during the process but fails.

A

Teardrop attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

It is a broad term that covers a multitude of technologies,
devices and processes.

A

Network Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A very targeted type of phishing activity. Attackers take the
time to conduct research into targets and create messages that are personal
and relevant.

A

Spear phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A dictionary of common passwords is used to
attempt to gain access to a user’s computer and network.

A

Dictionary attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Act as a barrier between the untrusted external networks and your trusted internal network.

A

Firewall Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A hacker detects the information by listening
to the message transmission in the network.

A

Passive eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

These viruses conceal themselves through
varying cycles of encryption and decryption.

A

Polymorphic viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Botnets can be mitigated by:

A
  • RFC3704 filtering
  • Black hole filtering
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ACRONYM: VPN

A

Virtual Private Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Used by an attacker to convince a system that it is
communicating with a known, trusted entity and provide the attacker with
access to the system.

A

IP Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Means using a random approach by trying different passwords and hoping that one work

A

Brute-force password guessing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Scans network traffic to actively block attacks.

A

Intrusion Prevention Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

This attack involves using IP spoofing and the ICMP to saturate a target network with traffic.

A

Smurf attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

ACRONYM: PHP

A

Hypertext Preprocessor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A hacker actively grabs the information by
disguising himself as friendly unit and by sending queries to
transmitters.

A

Active eavesdropping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Occur through the interception of network traffic. An attacker can obtain passwords, credit card numbers and other confidential information that a user might be sending over the network.

A

Eavesdropping attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Usually attach themselves to
executable code, such as .exe files.

A

File infectors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Types of password attacks:
Brute-force password guessing, Dictionary attack
26
It occurs when a malefactor executes a SQL query to the database via the input data from the client to server.
SQL injection attack
27
occurs when a hacker inserts itself between the communications of a client and a server.
Man-in-the-middle (MitM) attack
28
Types of Dos and DDos Attacks:
* TCP SYN flood attack * Teardrop attack * Smurf attack * Ping of death attack * Botnets
29
These viruses infect applications such as Microsoft Word or Excel.
Macro viruses
30
Types of Attacks:
1. Denial-of-service (DoS) and distributed denial-of-service (DDoS) attack 2. Man-in-the-middle (MitM) attack 3. Phishing and spear phishing attack 4. Drive-by attack 5. Password attack 6. SQL injection attack 7. Cross-site scripting (XSS) attack 8. Eavesdropping attack 9. Birthday attack 10. Malware attack
31
ACRONYM: DoS
Denial-of-service
32
This type of attack uses IP packets to ‘ping a target system with an IP size over the maximum of 65,535 bytes.
Ping of death attack
33
ACRONYM: XSS
Cross-Site Scripting
34
Are made against hash algorithms that are used to verify the integrity of a message, software or digital signature.
Birthday attack
35
Wireless networks are not as secure as wired ones. Without stringent security measures, installing a wireless LAN can be like putting Ethernet ports everywhere, including the parking lot.
Wireless Security
36
A type of malicious software that is appended to an application and is triggered by a specific occurrence, such as a logical condition or a specific date and time.
Logic bombs
37
Occurs when an attacker intercepts and saves old messages and then tries to send them later, impersonating one of the participants.
Replay
38
Because passwords are the most commonly used mechanism to authenticate users to an information system, obtaining passwords is a common and effective attack approach.
Password attack
39
A broad set of technologies, policies, and applications applied to defend online IP, services, applications, and other imperative data.
Cloud Security
40
ACRONYM: BGP
Border Gateway Protocol
41
ACRONYM: SQL
Structured Query Language
42
ACRONYM: IPS
Intrusion Prevention System
43
Protect an organization from a range of malicious software, including viruses, ransomware, worms and trojans.
Antivirus and Antimalware Software
44
Malicious software can be described as unwanted software that is installed in your system without your consent.
Malware attack
45
Three different controls of network security:
* Physical * Technical * Administrative
46
Types of eavesdropping attacks:
* Passive eavesdropping * Active eavesdropping
47
They are the millions of systems infected with malware under hacker control in order to carry out DDoS attacks.
Botnets
48
They differ from viruses in that they do not attach to a host file, but are self-contained programs that propagate across networks and computers.
Worms
49
They copy legitimate websites to fool you into entering personally identifiable information (PII) or login credentials.
Website cloning
50
The practice of sending emails that appear to be from trusted sources with the goal of gaining personal information or influencing users to do something.
Phishing
51
A type of program that is installed to collect information about users, their computers or their browsing habits.
Spyware
52
Most common types of malware:
* Macro viruses * File infectors * System or boot-record infectors * Polymorphic viruses * Stealth viruses * Trojans * Logic bombs * Worms * Droppers * Ransomware * Adware * Spyware
53
Use third-party web resources to run scripts in the victim’s web browser or scriptable application.
Cross-site scripting (XSS) attack
54
Drops undesirable traffic before it enters a protected network.
Black hole filtering
55
ACRONYM: NAC
Network Access Control
56
A program used to install viruses on computers.
Droppers
57
They take over system functions to conceal themselves.
Stealth viruses
58
ACRONYM: DDoS
Distributed denial-of-service
59
To ensure that potential attackers cannot infiltrate your network, comprehensive access control policies need to be in place for both users and devices.
Network Access Control
60
To reduce the risk of being phished, you can use these techniques:
Critical thinking, Hovering over the links, Analyzing email headers, Sandboxing
61
In this type of MitM attack, an attacker hijacks a session between a trusted client and network server.
Session hijacking
62
Create a connection to the network from another endpoint or site.
Virtual Private Networks
63
Designed to prevent unauthorized personnel from gaining physical access to network components such as routers, cabling cupboards and so on.
Physical Network Security
64
Cybercriminals are increasingly targeting mobile devices and apps. Within the next 3 years, 90 percent of IT organizations may support corporate applications on personal mobile devices.
Mobile Device Security
65
a common method of spreading malware where hackers look for insecure websites and plant a malicious script into HTTP or PHP code on one of the pages.
Drive-by attack
66
When a DDoS attack is detected, the ________________________ host should send routing updates to ISP routers so that they route all traffic heading to victim servers to a null0 interface at the next hop.
BGP (Border Gateway Protocol)
67
Types of network security
Network Access Control, Antivirus and Antimalware Software, Firewall Protection, Cloud Security, Data Loss Prevention, Virtual Private Networks, Intrusion Prevention Systems, Email Security, Mobile Device Security, Web Security, Wireless Security
68
ACRONYM: MitM
Man-In-The-Middle
69
Overwhelms a system’s resources so that it cannot respond to service requests.
Denial-of-service (DoS)
70
Consist of security policies and processes that control user behavior, including how users are authenticated, their level of access and also how IT staff members implement changes to the infrastructure.
Administrative Network Security
71
This will deny traffic from spoofed addresses and help ensure that traffic is traceable to its correct source network.
RFC3704 filtering
72
Refers to the steps you take to protect your own website. Will control your staff’s web use, block web-based threats, and deny access to malicious websites.
Web Security
73
ACRONYM: TCP SYN
Transmission Control Protocol Synchronize
74
Protect data that is stored on the network or which is in transit across, into or out of the network.
Technical Network Security
75
Blocks incoming attacks and controls outbound messages to prevent the loss of sensitive data.
Email Security
76
To reduce the risk of being phished, you can use these techniques:
Critical thinking, Hovering over the links, Analyzing email headers, Sandboxing
77
Common types of man-in-the-middle attacks:
Session hijacking, IP Spoofing, Replay
78
Attaches to the master boot record on hard disks.
System or boot-record infectors
79
ACRONYM: HTTP
Hypertext Transfer Protocol
80
A software application used by companies for marketing purposes; advertising banners are displayed while any program is running.
Adware