Network Attacks Flashcards

1
Q

Malware

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Spoofing

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Packet Sniffing

A

using hardware or software tools to capture and inspect data in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Packet Flooding

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

backdoors

A

eaknesses intentionally left by programmers or system and network administrators that bypass normal access control mechanisms

intended to help programmers conduct troubleshooting or administrative tasks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

packet sniffing

A

using hardware or software tools to capture and inspect data in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

DDos attack

A

attack that targets a network or server and floods it with network traffic from multiple servers/computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DOS attack

A

like a ddos, but can be anything that stops the network from working

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

TCP Handshake: Syn

A

A synchronize request from client to server to sync data flow

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

TCP Handshake: Syn/Ack

A

An acknowledgement of the request to sync and agreement to procced

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

TCP Handshake: Ack

A

A final message to acknowledge an open the sync from the client to the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ICMP DOS attack

A

attacker repeatedly sending ICMP packets to a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Syn flood DOS Attack

A

Flooding the server with syn requests to shut it down

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ping of death

A

AN ICMP DOS attack where a single oversized (more than 64KB) ICMP packet is sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

tcpdump

A

command-line network protocol analyzer

lightweight, converts key information about network traffic into formats easily read by humans

displays the source IP address, destination IP addresses, and the port numbers being used in the communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

tcpdump default

A

resolve host addresses to hostnames. It’ll also replace port numbers with commonly associated services that use these ports.

17
Q

botnet

A

collection of computers infected by malware that are under the control of a single threat actor, known as the “bot-herder.

18
Q

Passive Packet Sniffing

A

Data packets are read in transit

19
Q

Active Packet Sniffing

A

Packet is changed in transit

20
Q

IP Spoofing

A

Changing the source IP of a data packet to an authorized IP to gain to impersonate and gain access

21
Q

On-Path attack

A

Malicious actor places themselves in the middle of an authorized connection and alters the data in transit

22
Q

Replay attack

A

attacker receives a data packet in transit, then delays it or repeats it at another time

23
Q

Smurf attack

A

sniff someone’s IP address and then flood it with packets

24
Q

Network Interface Card

A

piece of hardware that connects the device to a network

25
Q
A
26
Q
A