Attacks Flashcards

1
Q

Sniffing

A

hjk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Man in the Middle

A

hjk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DoS

A

hjk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Smurf

A

hjk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Fraggle

A

hjk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

SYN Flood

A

hjk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Broadcast Storms

A

hjk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ping of Death

A

hjk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Dial Tone

A

hjk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

War Driving

A

hjk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Evil Twin

A

hjk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Bluesnarfing

A

hjk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Bluejacking

A

hjk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DDoS

A

hjk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Replay/Playback

A

hjk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Brute Force

A

hjk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Malicious Port Scanning

A

hjk

18
Q

Backdoor 1

A

provides another way of accessing a system

19
Q

Backdoor 2

A

hjk

20
Q

Virus

A

A set of malicious code that attaches itself to a host application. Once the host application is executed, the malicious code executes as well. (Chapter 6)

21
Q

Worm

A

a self-replicating malware that resides in memory. It uses different transport protocols to travel over the network and consumes network bandwidth.

22
Q

Trojan Horse

A

appears to be something useful but includes a malicious component, such as installing a backdoor on a system. Many Trojans are delivered via drive-by downloads.

23
Q

Ransomeware

A

A type of Trojan. Attackers take control of a user’s computer and then demands a ransome

24
Q

Logic Bomb

A

a string of code embedded into an application/script that executes in response to an event.

25
Q

Rootkit

A

A group of programs that hides the fact that the system has been infected or compromised by malicious code.

26
Q

Malformed MIME

A

hjk

27
Q

Pharming

A

hjk

28
Q

Transitive Attack

A

hjk

29
Q

Social Engineering

A

social tactics to trick users into giving up info or performing actions they wouldn’t normally take.

30
Q

Typosquatting

A

hjk

31
Q

Watering Hole Attack

A

hjk

32
Q

Piggybacking/Tailgating

A

the practice of one person following closely behind another without showing credentials

33
Q

Tracking Cookie

A

hjk

34
Q

Phishing

A

the practice of sending email to users with the purpose of tricking them into revealing personal info or clicking on a link. (Malicious Spam)

35
Q

Whaling

A

form of spear phishing that attempts to target high-level executives (C Level).

36
Q

Vishing

A

an attack using the phone system to trick users into giving up personal and financial information

37
Q

Botnet

A

Robot Network: includes multiple computers that act as robots and function together in a network for malicious purposes.

38
Q

Spam

A

unwanted or unsolicited email

39
Q

Spear Phishing

A

a targeted form of phishing.

40
Q

Spim

A

a form of spam using instant messaging