15 D6 Flashcards

1
Q

Auditing:

__ - Determines whether a port is open, closed, or filtered.

A

Port Scanning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Auditing:

__ - A scanned list is derived from the discovery options and address group options.

A

Targeting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bonk or Boink?

___ has the ability to attack a range of ports.

A

Boink

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

___ Attacks occur when multiple compromised systems take part in flooding the bandwidth or resources of a targeted system.

A

DDoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Host-based Security:
4 Methods of detecting packets sniffer are:
___ ___ ___ ___

A

Latency Tests
ARP Method
Ping Method
DNS Queries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A ___ Attack occurs when the attacker changes his IP to that of the victim and pings the broadcast IP of the victim’s network. All hosts within the target network reply to the victim with an ICMP echo reply, exhausting resources.

A

Smurf Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

___ and ___ attacks are the reverse concept of teardrop, instead of setting the offset lower, they make it larger than the correct one.

A

Bonk and Boink Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

___ Attack is a popular DoS attack against Windows NT 4.0, Win 2000, and Win XP and is a NetBIOS session request flooder

A

NBTStream Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

___ uses control flags of the TCP 3 way handshake. Attacker sends thousands of SYN flags to victim port, if the port is open the victim replies with SYN/ACK, but the handshake is never completed.

A

SYN Flood Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A ___ attack sends overlapping fragmented UDP packets to the target.

A

Teardrop attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

___ Attack uses UDP instead of ICMP. Normally the destination port is 7 (echo) or 19 (chargen).

A

Fraggle Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Auditing:

__ - Performs various tests including registry checks, ICMP, and TCP fingerprinting to determine target OS.

A

OS Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

___ is an application used to launch a DDoS, with little or no knowledge of how it works. Generates thousands of TCP, UDP, and/or HTTP requests to overwhelm a server/host.

A

Low Orbit Ion Cannon (LOIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Vulnerability Scanning/Patching:

___ is a 4step procedure that begins once the scanner receives the job file.

A

Auditing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

___ - user types in target URL, sets this application to operate in supercharged or normal mode, and ‘fires’. The program sends traffic to that URL in an attempt to overload the site and bring it down.

A

High Orbit Ion Cannon (HOIC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Bonk or Boink?

___ attacks UDP port 53 (DNS).

A

Bonk

17
Q

Auditing:

__ - Runs audits on ports to determine vulnerabilities associated with services on particular ports.

A

Auditing

18
Q

The goal of a __ Attack is to disrupt services or deny communications directed at a target.

A

DoS