Ch.14 Network threats and Mitigation Flashcards

1
Q

____Prevents users from access to the network

A

DoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

___ is very large ICMP packets sent to the remote host victim flooding the victims buffer causing a reboot or a hang.

A

Ping of death

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An unreachable gateway is an attempt to make a hosts ____ unreachable so the attacker can preform a ____ attack

A

Default gateway, Man in the middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An amplified DoS attack is a ___ attack

A

Distributed denial of service (DDoS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A traffic spike is a ___ flood

A

SYN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

___ is the process of changing a source IP address so that one computer appears to be a different computer

A

Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ARP cache poising is___

A

ARP spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Changing the http packet is known as ___ spoofing

A

Referrer spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Zero day attacks refer to what?

A

new bugs and viruses that have not yet been known and corrected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

___addresses methods of spying used on information systems and how to protect against them

A

TEMPEST

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

When somebody intercepts packets intended for one computer and reads the data is known as ____

A

Man in the middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Constantly scanning the network for break-ins is known as ____

A

Active detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The logging of network events to a file is known as ___

A

Passive detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

___involves using tools to shore up network walls against attacks

A

Proactive defense.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly