MOD 16 Flashcards
What is it called when you can’t see who or where you’re being attacked?
Anonymity
Many points of attacks include _____ and _______
targets / origins
Computer O/S and even the most simple networks are ______-
complex
What is it called when hosts create unknown connections and security rule clashes?
Unknown perimeter
What are ideologies of attacker motives?
Hactivism and Cyberterrorism
What tells what ports are open on what computers?
Port scan
What is a great tool for port scanning?
Nmap
Which wiretapping media has Inductance?
cable
Which wiretapping media has huge volume and death?
microwave
Which wiretapping media is heavily multiplexed?
Satellite
Which wiretapping media is difficult to tap without being detected?
Optical fiber
Which transit threat has Theft of Service?
Wireless
Which is used for Packet Sniffing?
Packet Sniffing
What is it called when cybercriminals use deception to appear as another person or source of information?
spoofing
What is it called when a perpetrator positions himself in the middle of a conversation between a user and an application?
Man in the Middle (MITM)