2.4 – Threats Flashcards

1
Q
  • DOS = Denial of Service
A

o Sends a large number of packets in hopes of overwhelming a system so it can no longer provide its service

o One-on-one attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Ping of Death

A

when large fragmented ICMP is used to overwhelm a host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • DDOS = Distributed Denial of Service
A

o Like DOS except there are many attackers & 1 victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Traffic Spike

A

sign that network undergoing DDOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Botnet

A

network of victim computers under control of attacker

—Usually made of malware victims that are unaware of attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Coordinated Attack

A

a command & control server is used to command a Botnet to coordinate the DDOS attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Friendly / Unintentional DOS

A

–Can bring down service by sharing link

–Link goes viral & server can’t handle the load

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • Zero-Day Attack [worst fear]
A

o Vulnerability being exploited out in the wild but no known fix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • Spoofing
A

o Techniques an attacker uses to hide identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • ARP Spoofing
A

Attacker spoofs the IP to MAC mapping usually to perform a man-in-the-middle attack [on-path attacks]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • IP Spoofing
A

Attackers impersonate a device by IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • Email Spoofing
A

Attackers send emails using address targets trust

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • DNS Poisoning
A

o False DNS info [change domain info]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • Brute Force Attacks
A

o Attempt to defeat password with automated random guessing

o Long & complex passwords better

o Prevented by limiting number of guesses

o Can always succeed given enough time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • Dictionary Attacks
A

o Use a list of known passwords to attack

o NOT using common words / phrases better

o Avoid reusing passwords to limit effectiveness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • Insider Threat
A

o A trusted person who commits a malicious act

17
Q
  • Cross-site Scripting [XSS]
A

o An attacker injects malicious code into a website through an insecure form

18
Q
  • SQL Injection Attacks
A

o An attacker compromises a SQL database usually through cross-site scripting

o SQL = structured query language
—Is used to create, store, & retrieve info from database