Network+ Extra 4 Flashcards
(10 cards)
A DNS server is often used in an ______________ attack, but other services could be used in the exploit as well. With these attacks, legitimate servers are tricked into flooding responses at a target system; the forged request tends to be small but results in large responses hitting the target.
(DoS) Amplification Attack:
One variant of a DoS attack is for an attacker to initiate multiple TCP sessions by sending SYN segments but then never complete the three-way TCP handshake.
TCP SYN FLOOD :
Power spikes: Excess power for a brief period of time.
Electrical surges: Excess power for an extended period of time.
Power fault: A brief electrical outage.
Blackout: An extended electrical outage.
Power sag: A brief reduction in power.
Brownout: An extended reduction in power.
power failure types :
DR focuses on getting critical applications back online, and BC focuses on the tasks carried out by an organization to ensure that critical business functions continue to operate during and after a disaster.
Disaster Recover / Business Continuity
The sending of unauthorized messages over a Bluetooth connection to a device.
Bluejacking
Provides unauthorized access from a wireless device through a Bluetooth connection.
BlueSnarfing
Creates unauthorized backdoor access to connect a Bluetooth device back to the attacker.
Bluebugging
Avoiding common passwords, Upgrading firmware, Patching and updating, File hashing, Disabling unnecessary services, Using secure protocols, Generating new keys, Disabling unused ports. This includes both ports running IP and physical ports themselves, Changing the native VLAN.
Network Hardening
This involves preventing rogue DHCP servers and DHCP pool exhaustion attacks by restricting ports from accepting certain DHCP messages.
DHCP Snooping
is a commonly used protocol between a DSL modem in a home (or business) and a service provider. Specifically, ? encapsulates PPP frames within Ethernet frames. This approach allows an Ethernet connection to leverage the features of PPP, such as authentication.
Point-to-Point Protocol over Ethernet (PPPoE)