Chapter 14: Network Threats and Attacks Flashcards

Understand Network Threats and Attacks

1
Q

{Blank} (or Malicious software) is one of the most significant threats to computer security. These objects infect computer systems and then perform some type of evil action: possibly stealing information, damanging data, or otherwise disrupting normal use of the system.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the two components does malware have?

A
  1. Propagation mechanism
  2. A payload
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The {blank} is how the malware spreads from one system to another.

A

Propagation mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The {blank} is the malicious action that the malware performs.

A

Payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

{Blank} spread between systems after a user action.

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

{Blank} spread under their own power.

A

Worms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

{Blank} pose as beneficial software with a hidden malicious effect.

A

Trojan Horses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

On-path attacks take evesdropping to the next level by inserting an attacker in between the client and the server.

What are the two types of on-path attacks?

A
  • Man-in-the-Middle (MitM)
  • Man-in-the-Browser (MitB)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In a {blank} attack, the attacker tricks the sending syatem into communicating with the attacker, rather than the intended server. The user authenticates to the fake server set up by the attacker, and the attacker acts as a relay and can view all the communications that take place between the client and the server.

A

Man-in-the-Middle (MitM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The {blank} attack is a variation on the man-in-the-middle attack, where the attacker compromises the user’s web browser or browser plugin or extension to gain access to web communication. The major difference is that the attacker isn’t present on a different network device from the user and server. The attacker is actually present on the user’s computer.

A

Man-in-the-Browser (MitB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

{Blank} attacks send unwanted traffic from a single attacker system to a victim server, overwhelming it with requests.

A

Denial-of-Service (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

{Blank} attacks use a botnet to send the traffic from many different sources.

A

Distributed Denial-of-Service (DDoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Kim is the system administrator for a small business network that is experiencing securoty problems. She is in the office one evening working on the problem, and nobody else is there. As she is watching, she can see that systems on the other side of the office that were previously behaving normally are now exhibiting signs of infection one after the other. Which type of malware is Kim likely dealing with?

A. Virus
B. Worm
C. Trojan Horse
D. Logic bomb

A

Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which one of the following statements about denial-of-service (DoS) attacks is incorrect?

A. They originate from many different sources.
B. They can disrupt the availability of systems.
C. They require large amounts of bandwidth.
D. They are easily detectible.

A

They originate from many different sources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly