MOD 16 Flashcards

1
Q

What is it called when you can’t see who or where you’re being attacked?

A

Anonymity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Many points of attacks include _____ and _______

A

targets / origins

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Computer O/S and even the most simple networks are ______-

A

complex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is it called when hosts create unknown connections and security rule clashes?

A

Unknown perimeter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are ideologies of attacker motives?

A

Hactivism and Cyberterrorism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What tells what ports are open on what computers?

A

Port scan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a great tool for port scanning?

A

Nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which wiretapping media has Inductance?

A

cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which wiretapping media has huge volume and death?

A

microwave

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which wiretapping media is heavily multiplexed?

A

Satellite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which wiretapping media is difficult to tap without being detected?

A

Optical fiber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which transit threat has Theft of Service?

A

Wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which is used for Packet Sniffing?

A

Packet Sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is it called when cybercriminals use deception to appear as another person or source of information?

A

spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is it called when a perpetrator positions himself in the middle of a conversation between a user and an application?

A

Man in the Middle (MITM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is an attack that uses a fake identity, such as a network identity, to gain unauthorized access?

A

Masquerade

17
Q

What is a method of monitoring network availability and activity to identify anomalies, including security and operational issues?

A

Traffic flow analysis

18
Q

What is related to SQL Injection attacks and IIS/Apache attacks?

A

Web Site Defacement

19
Q

What lets you transverse the directory structure?

A

Dot-Dot-Slash

20
Q

Which website vulnerability is the result of altering the code shown in the URL?

A

Application Code Errors

21
Q

Which web site vulnerability has scripting done on the server to make web pages more dynamic?

A

Server Side Includes (SSI)

22
Q

Which attack occurs when legitimate users are unable to access their systems?

A

Denial of Service

23
Q

Which attack attempts to overwhelm a targeted device with ICMP echo-requests (pings).

A

ICMP (Internet Control Message Protocols)

24
Q

Which attack sends more pings than the bandwidth can respond to?

A

Ping of Death

25
Q

Which attack sends SYN requests and crasheess the SYN_RECV queue?

A

Syn Flood

26
Q

Which attack sends fragmented IP datagrams that can’t be put together and locks the O/S?

A

Teardrop

27
Q

Which attack gets a router to advertise itself as the best path to every address in the network?

A

Traffic redirection

28
Q

Which attack can get a DNS server to point to non-existing entries or maliciously reroute it?

A

DNS attack

29
Q

Which attack plants trojans and zombies on computers?

A

DDoS attack

30
Q

What is a favorite for zombie farms?

A

University networks

31
Q

What is a small bit of text on the computer that is the biggest threat to aggregation?

A

Cookies

32
Q
A