CHAPTER 14 NETWORK THREATS AND MIGRATION Flashcards
What is IP spoofing?P481
It is the process of changing a source IP address so that one computer appears to be a different computer.
What is brute force attack?P482
It is a form of password cracking.
Setting an account lockout policy is the simplest migration technique to defeat what?P482
Brute force attacks
Some one who attempts to take over a user’s session with a secure server after the user has been authenticated does that?P482
Session hijacking
An attacker sets the session ID ahead of time by sending a link to the victim with Id presets is doing what?P482
Session fixation
An attacker that uses a sniffer to steal a session cookie from the user is doing what?P482
Session sidejacking
An attacker uses the user’s computer to run code on the site that may allow him to obtain the cookie does what?p482
Cross site scripting
What protocol can you use to prevent a VLAN from using a hopping attack?P482
Trunking protocol
VLANs are a layer 3 subdivisions of the ports in a single switch?P482T/F
False layer 2
Authentication issues can lead to improper access like what?p483
Stolen data and a whole host of other problems
What are examples of AAA servers that verify the identity of ,grant access to, and track actions of users?P483
TACACS+(terminal access controller access control systm plus) , RADIUS ( remote access dial up user service.
Name some of the best known virus threats to your computer’s security/p484
Chernobyl, michelangelo, melissa,I love you, and love you
There are several different kinds of viruses but the most popular ones are?P484
File viruses macro viruses, and boot sector viruses.
What is the term that describes any software that harms a computer ,deletes, or takes actions the user did not authorize?P485
Malicious software or malware
What is basically a script of commonly enacted commands used to automatically carry out tasks with out requiring a user to initiate them?P486
Macro