chapter 14 Flashcards

1
Q

Denial of service( DoS)

474

A

DoS prevents users from accessing network and resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are some of DoS ?

474

A

The Ping of death
unreachable gateway
distributed DoS DDos

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A ping of death?

474

A

sending a humongous ICMP packet to a remote host victim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

distributed DoS DDos?

475

A

is a type of DOS attack where multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing a Denial of Service (DoS) attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

botnet

475

A

is a group of programs connected on the internet for the purpose of performing a task in a coordinated manneer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

botnet

475

A

is a group of infected computers that are under the control of one or more individuals. The infected computers are used to perform tasks impossible for a single computer, such as distributing millions of SPAM e-mail’s or a Distributed Denial of Service (DDoS) attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Traffic spike is _____

476

A

is one of DDoS attack is a major spike in traffic in the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

we recognize the traffic spike using what?

476

A

a network intrusion detection system ( IDS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A smurf

477

A

it is a vertion of a DoS attack tat flood it’s victim with spoofed broadcast ping messages.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

how does smurf work?

477

A
  • smurf involves stealing someone IP address.
  • A smurf attack refers to a malicious network attack on a computer with the end-goal of rendering the victim’s computer unusable. An attacker does this attack by creating a spoof, or virtual copy, of a victim’s IP address and broadcasts that IP address by attaching the victim’s IP address to a broadcast IP address. Once the victim’s IP address is broadcasted, most networked devices respond to the IP address by sending a data packet back to the source from which the broadcast came. Therefore, if an attacker is broadcasting a victim’s IP address, all of the replies can become so overwhelming that they render a victim’s computer inert.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

permanent DoS attack

477

A

known as Phlashing is a permanent denial of service (DoS), it attack that firmware located in many systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SYN flood

478

A

Alternatively referred to as an SYN flood, an SYN attack is a Denial of Service (DOS) attack on a computer or network. It is carried out by flooding the network with spoofed SYN packets or packets that contain an address that never responds to the SYN/ACK requests. Essentially, the connection queues fill up with bad connections, and service is denied to legitimate users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Stacheldraht

478

A

is a program that can be used to perpetrate several different DDoS attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A DNS amplification attack

479

A

A DNS amplification attack is a form of reflection attack, The attacker spoofs look-up requests to domain name system (DNS) servers to hide the source of the exploit and direct the response to the target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

NTP reflection attack:

479

A

the attacker and his bots sends a small spoofed 8 byts UDP to NTP servers that requests a large amount of data to be sent to the target IP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

the NTP attack can be prevented using which version of NTP?

479

A

version 4.2.7

17
Q

ARP cache poisoning

480

A

the cache can be poisoned by pinging a device with incorrect IP address

18
Q

Brute Force:

482

A

is a form of a password attack

19
Q

how to prevent a brute force attack?

482

A

setting an account lockout policy , that is going to lock up the account after a number of failed attemps.

20
Q

VLAN hopping

482

A

a method of attacking networked resources on a Virtual LAN (VLAN). The basic concept behind all VLAN hopping attacks is for an attacking host on a VLAN to gain access to traffic on other VLANs that would normally not be accessible.

21
Q

what is Double tagging?

482

A

Double tagging is a method involves tagging transmitted frames with two 802.1q headers, one of the headers is used for Victim switch and another is used for the attacker’s switch.