CHAPTER 14 NETWORK THREATS AND MIGRATION Flashcards

1
Q

What is IP spoofing?P481

A

It is the process of changing a source IP address so that one computer appears to be a different computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is brute force attack?P482

A

It is a form of password cracking.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Setting an account lockout policy is the simplest migration technique to defeat what?P482

A

Brute force attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Some one who attempts to take over a user’s session with a secure server after the user has been authenticated does that?P482

A

Session hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An attacker sets the session ID ahead of time by sending a link to the victim with Id presets is doing what?P482

A

Session fixation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An attacker that uses a sniffer to steal a session cookie from the user is doing what?P482

A

Session sidejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An attacker uses the user’s computer to run code on the site that may allow him to obtain the cookie does what?p482

A

Cross site scripting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What protocol can you use to prevent a VLAN from using a hopping attack?P482

A

Trunking protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

VLANs are a layer 3 subdivisions of the ports in a single switch?P482T/F

A

False layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Authentication issues can lead to improper access like what?p483

A

Stolen data and a whole host of other problems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are examples of AAA servers that verify the identity of ,grant access to, and track actions of users?P483

A

TACACS+(terminal access controller access control systm plus) , RADIUS ( remote access dial up user service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name some of the best known virus threats to your computer’s security/p484

A

Chernobyl, michelangelo, melissa,I love you, and love you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

There are several different kinds of viruses but the most popular ones are?P484

A

File viruses macro viruses, and boot sector viruses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the term that describes any software that harms a computer ,deletes, or takes actions the user did not authorize?P485

A

Malicious software or malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is basically a script of commonly enacted commands used to automatically carry out tasks with out requiring a user to initiate them?P486

A

Macro

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What virus works their way int the master boot record that’s essentially the ground zero sector on your hard disk where applications aren’t supposed to live?P486

A

Boot sector

17
Q

What is one that infects both the boot sector and files on your computer ,making such virus particularly dangerous and exasperatingly difficult to remove?P486

A

Multipartite virus

18
Q

Antivirus software uses ——- —- that identify known malware ,and must be updated frequently?P487

A

Definition files

19
Q

Does secure shell transmit credentials in clear text?P489Y/N

A

No

20
Q

Spying in information systems can also be accomplished by what?P489

A

Capturing and analyzing leaking emanations of things like ryadio or electrical signals ,sounds, and vibrations.

21
Q

What does malicious users mean?P489

A

The damaging activity on your network can come from both inside and outside the network.

22
Q

Services that are not required to be running on a system should be what?P488

A

disabled