{ "@context": "https://schema.org", "@type": "Organization", "name": "Brainscape", "url": "https://www.brainscape.com/", "logo": "https://www.brainscape.com/pks/images/cms/public-views/shared/Brainscape-logo-c4e172b280b4616f7fda.svg", "sameAs": [ "https://www.facebook.com/Brainscape", "https://x.com/brainscape", "https://www.linkedin.com/company/brainscape", "https://www.instagram.com/brainscape/", "https://www.tiktok.com/@brainscapeu", "https://www.pinterest.com/brainscape/", "https://www.youtube.com/@BrainscapeNY" ], "contactPoint": { "@type": "ContactPoint", "telephone": "(929) 334-4005", "contactType": "customer service", "availableLanguage": ["English"] }, "founder": { "@type": "Person", "name": "Andrew Cohen" }, "description": "Brainscape’s spaced repetition system is proven to DOUBLE learning results! Find, make, and study flashcards online or in our mobile app. Serious learners only.", "address": { "@type": "PostalAddress", "streetAddress": "159 W 25th St, Ste 517", "addressLocality": "New York", "addressRegion": "NY", "postalCode": "10001", "addressCountry": "USA" } }

MODULE 6 Flashcards

(13 cards)

1
Q

Backscatter trafficking:

A

Advertising unused IP addresses to monitor attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Categories of resources that could be affected by DoS attacks:

A
  • Network bandwidth
  • System resources
  • Application resources
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Flooding attack types:

A
  • ICMP flood
  • UDP flood
  • TCP SYN flood
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SYN spoofing:

A

Attacking the ability of a server to respond to connection requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SIP flood:

A

Exploiting a single invite request that triggers resource consumption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Amplification attack:

A

Sending a packet that generates multiple response packets with a spoofed address of the target to intermediaries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SIP stands for _____

A

Session Initiation Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Reflection attack:

A

Sending packets to an intermediary with a spoofed address of the target

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Ways to identify DoS type of attack:

A
  • Analyze packets
  • Filter upstream
  • Fix bugs
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Application-based bandwidth attack:

A

An attack that forces a system to execute resource-consuming operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DoS attack preventions:

A
  • TCP
  • CAPTCHAs
  • Mirrored servers
  • Blocking spoofed addresses
  • Blocking suspicious services
  • Blocking IP directed broadcasts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IDS stands for _____

A

Intrusion Detection System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IDS:

A

A detector of abnormal traffic patterns

How well did you know this?
1
Not at all
2
3
4
5
Perfectly