Analyzing Potentially Malicious Activity Flashcards

1
Q

Distributed denial of service attack (DDoS attack)

A

An attack that uses multiple compromised hosts (a botnet) to overwhelm a service with requests or response traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Traffic Spike

A

A sharp increase in connection requests in comparison with a baseline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Beaconing

A

A means for a network node to advertise its presence and establish a link with other nodes, such as the beacon management frame sent by an AP. Legitimate software and appliances do this, but it is also associated with Remote Access Trojans (RAT) communicating with a Command & Control server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Internet relay chat (IRC)

A

A group communications protocol that enables users to chat, send private messages, and share files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

ARP Spoofing

A

A network-based attack where an attacker with access to the target local network segment redirects an IP address to the MAC address of a computer that is not the intended recipient. This can be used to perform a variety of attacks, including DoS, spoofing, and Man-in-the-Middle.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Rogue Device

A

An unauthorized device or service, such as a wireless access point DHCP server, or DNS server, on a corporate or private network that allows unauthorized individuals to connect to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Non-standard Port

A

Communicating TCP/IP application traffic, such as HTTP, FTP, or DNS, over a port that is not the well-known or registered port established for that protocol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

mismatched port/application traffic

A

Communicating non-standard traffic over a well-known or registered port.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Worm

A

type of malware typically results in high volumes of traffic saturating switches and router interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does 802.1x help protect against rogue devices?

A

802.1x limits network access to only pre-authorized devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Privilege Escalation

A

The practice of exploiting flaws in an operating system or other application to gain a greater level of access than was intended for the user or application.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Nessus

A

One of the best-known commercial vulnerability scanners, produced by Tenable Network Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

OpenVAS

A

An open-source vulnerability scanner, originally developed from the Nessus codebase at the point where Nessus became commercial software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Qualys

A

A cloud-based vulnerability management solution. Users install sensor agents at various points in their network, and the sensors upload data to the cloud platform for analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Nmap

A

An IP and port scanner used for topology, host, service, and OS discovery and enumeration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Metasploit Framework (MSF)

A

A platform for launching modularized attacks against known software vulnerabilities.

17
Q
A