Ch5 Securing Individual Systems Flashcards
most cyber-attacks are mitigated fairly quickly, one exception is ___
Denial of Service
a ___ attack might involve a ping flood or UDP flood
Volume
when a client sends continuous SYN requests without waiting for a response, this is a ___ attack
protocol
how do later versions of Apache web server defend against a slow loris attack?
shorter timeouts when waiting for responses
in a ___ attack, conversations are repeatedly initiated by a client with a web server but never continued
+++slow loris
in a ___ attack, the IP address is spoofed so everyone starts responding to the target
smurf
in a ___ attack, malware is used to generate a botnet and several computer attack the target at once
Distributed Denial of Service (DDOS)
when spam is done over instant messaging it is called ___
spim
___ is an attempt (via email) to collect information, targeted to a particular person
spear phishing
___ is like phishing, but more dangerous and done using voice
vishing
___ is just trying to get you to click on an ad, but ___ is trying to get you to click on something different than what you thought you were clicking
clickbait; clickjacking
___ is taking advantage of common typos to send you to a decoy url
typo squatting
if you let the registration of a domain lapse, you might become a victim of ___
domain hijacking
in ___ a user’s group might be surreptitiously changed to one with more permissions
privilege escalation
when a 3rd party inserts themselves into a conversation without the other two knowing, this is the beginning of a ___ attack
man in the middle (MITM)
for wireless connections, ___ or ___ protocols have encryption, but ___ does not
WPA; WPA2; WEP
the ___ protocol is used to secure financial data on Bluetooth connections
NFC
when an attacker convinces a system that his address is the target computers or vice versa, this is called ___
spoofing
___ is lying to the system about the IP address for another machine
ARP poisoning
in a ___attack, a password or certificate is obtained, and the login performed again
replay
in a ___attack, the system is tricked into using a more primitive version of the protocols, which is more easily hacked
downgrade
in ___ the attacker must enter a live conversation and inject information in real-time
session hacking
system ___ is the ability to withstand a negative impact
resiliency
the ability to add more servers to meet changing network demand is ___, and if you can also reduce servers as demand contracts, this is called ___
scalability; elasticity
___ is a way to achieve system resiliency through the ability to return to an earlier state
non-persistence
in ___ recovery, the system revert back to an earlier OS or application version
known state
in ___ recovery, drivers revert to an earlier version
rollback