ch 6 Networking Protocols and Threats Flashcards

1
Q

PORT ranges

A
Port Range Category Type Description
0–1023 Well-Known Ports This range defines commonly used
protocols; for example, HTTP uses port
80. They are designated by the IANA
(Internet Assigned Numbers Authority),
which is operated by the ICANN (Internet
Corporation for Assigned Names and
Numbers).
1024–49,151 Registered Ports Ports used by vendors for proprietary
applications. These must be registered
with the IANA. For example, Microsoft
registered port 3389 for use with the
Remote Desktop Protocol (RDP), aka
Microsoft Terminal Server.
49,152–65,535 Dynamic and Private Ports These ports can be used by applications but
cannot be registered by vendors.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Denial-of-service (DoS)

A

attacks that attempt to make computer resources unavailable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Smurf attack:

A

attacking computer broadcasts
the ICMP echo requests to every computer on its network or subnetwork.
In addition, in the header of the ICMP echo requests will be a
spoofed IP address. That IP address is the target of the Smurf attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Fraggle:

A

UPD port 7 (Echo) and port 19

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

tear drop attack

A

Sends mangled IP fragments with overlapping and oversized
payloads to the target machine. This can crash and reboot various operating systems
due to a bug in their TCP/IP fragmentation reassembly code

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

fork bomb

A

Works by quickly creating a large number of processes to saturate
the available processing space in the computer’s operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

distributed denial-of-service (DDoS)

A

attack is when a group of compromised

systems attacks a single target, causing a DoS to occur at that host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

watering hole attack

A

This targeted attack is when an attacker profiles the
websites that the intended victim accesses. The attacker then scans those websites
for possible vulnerabilities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

null attack

A

type of exploit that makes unauthenticated Net-

BIOS connections to a target computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Pharming

A

is when an attacker redirects one website’s traffic to another website that
is bogus and possibly malicious

How well did you know this?
1
Not at all
2
3
4
5
Perfectly