10.1 Flashcards

1
Q

This is the person in the original sense of the word is someone who Masters the inner workings of computer hardware and software to better understand them today this person is used to be a complement reflecting extraordinary computer skills and the word is used more generally describe individuals again on authorize access the system or networks with or without malicious intent

A

Hacker or hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A weakness of a system process architecture that could lead to compromise information or on authorize access is known as a

A

Vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The act of taking advantage of a phone or abilities called

A

Exploit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

——- project is funded by the US Department of homeland security and list free to access use analyze vulnerabilities and exposures that only MITRE corporation can make changes to

A

Cve

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

It’s like like like like like vulnerability receives a standardized identification number which makes it easier to track vulnerabilities cross systems

A

CVE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

 Which could be a Miller and check the file such a free music download or malware infected device such as a USB drive wine around simile left and garden for someone to take an attempt to use on their own computer not realizing what is on the download or what is on the USB drive that could possibly Turn you into a victim compromise your data or online accounts

A

Baiting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This is where something such as a free gift or services offered exchange for private information or temporary access to the users computer system

A

Quid pro quo

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Playing a blank solution that identifies sense of data on the network to prevent it from being coffee or transmit it often at work

A

Data loss prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is the type of deal with the tech that is bounced off on infected computers called reflectors before Being directed at the target

A

DRDOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

I’m here just kind of attack is a DRDOS attack take me amplified when conducted using small simple request the trigger very large responses from the target

A

Amplifying DRDOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which type of TOS attack damage is the devices firmware beyond repair this is called breaking advice because infection effectively turns the device into a brick

A

PDOs or permanent DOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An unintentional DOs Attack is not done with malicious intent

A

Friendly DOS attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Previously called and man in the middle attack relies on intercepted transmission can take several forms in all forms of attack redirection captures secure transmissions as they occur

A

On path attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

 when a Wi-Fi client is legitimately connected to a wireless access point the a P or the client can send it to the office indication frame to tell other devices that you authentication session is being terminated. These frames are unencrypted and are easily spoofed the attacker send fake tortilla sanitation frames to the AP client or both To trigger a D authentication process

A

Deauthentication attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TCP/IP particles are inherently ——

A

Insecure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A well-known exploit called – – – – – – – hackers take advantage of this insecure protocol with a client running a FTP utility request data from the FTP server the client normally specifies it’s old IP address and FTPs default port number however it’s possible for the client to specify any port on any host IP address

A

FTP bounce