CHAPTER 14 NETWORK THREATS AND MIGRATION Flashcards
What is IP spoofing?P481
It is the process of changing a source IP address so that one computer appears to be a different computer.
What is brute force attack?P482
It is a form of password cracking.
Setting an account lockout policy is the simplest migration technique to defeat what?P482
Brute force attacks
Some one who attempts to take over a user’s session with a secure server after the user has been authenticated does that?P482
Session hijacking
An attacker sets the session ID ahead of time by sending a link to the victim with Id presets is doing what?P482
Session fixation
An attacker that uses a sniffer to steal a session cookie from the user is doing what?P482
Session sidejacking
An attacker uses the user’s computer to run code on the site that may allow him to obtain the cookie does what?p482
Cross site scripting
What protocol can you use to prevent a VLAN from using a hopping attack?P482
Trunking protocol
VLANs are a layer 3 subdivisions of the ports in a single switch?P482T/F
False layer 2
Authentication issues can lead to improper access like what?p483
Stolen data and a whole host of other problems
What are examples of AAA servers that verify the identity of ,grant access to, and track actions of users?P483
TACACS+(terminal access controller access control systm plus) , RADIUS ( remote access dial up user service.
Name some of the best known virus threats to your computer’s security/p484
Chernobyl, michelangelo, melissa,I love you, and love you
There are several different kinds of viruses but the most popular ones are?P484
File viruses macro viruses, and boot sector viruses.
What is the term that describes any software that harms a computer ,deletes, or takes actions the user did not authorize?P485
Malicious software or malware
What is basically a script of commonly enacted commands used to automatically carry out tasks with out requiring a user to initiate them?P486
Macro
What virus works their way int the master boot record that’s essentially the ground zero sector on your hard disk where applications aren’t supposed to live?P486
Boot sector
What is one that infects both the boot sector and files on your computer ,making such virus particularly dangerous and exasperatingly difficult to remove?P486
Multipartite virus
Antivirus software uses ——- —- that identify known malware ,and must be updated frequently?P487
Definition files
Does secure shell transmit credentials in clear text?P489Y/N
No
Spying in information systems can also be accomplished by what?P489
Capturing and analyzing leaking emanations of things like ryadio or electrical signals ,sounds, and vibrations.
What does malicious users mean?P489
The damaging activity on your network can come from both inside and outside the network.
Services that are not required to be running on a system should be what?P488
disabled