Chapter 14 - Network Threats and Mitigation Flashcards

1
Q

it prevents users from accessing the
network and/or its resources.

A

Denial of Service (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

used to see whether a computer is responding to IP requests.

A

The Ping of Death

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

version of a DoS attack that floods its victim with spoofed broadcast ping messages.

A

Smurf

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DoS attack that inundates the receiving machine with
lots of meaning-less packets.

A

SYN Flood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

they initiate synchronized DoS attacks from multiple sources and
can target multiple devices.

A

Tribe Flood Network (TFN) and Tribe Flood Network 2000 (TFN2K)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

are basically little programs that can display a
message, delete files, or even send out huge amounts of meaningless data over a network to block legitimate messages.

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

do their damage by replacing some or all of the
targetprogram’s code with their own. Executable on files ending in
.COM, .EXE, and .DLL.

A

File Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

automatically carry out tasks without requiring a

user to initiate them, usually harmless. (i.e. Visual Basic macro-
scripting)

A

Macro Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

overwrite your boot sector, making it
appear as if there’s no pointer to your operating system. Missing
Operating System or Hard Disk Not Found error message.

A

Boot-Sector Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

affects both the boot sector and files (i.e.Anthrax and Tequila)

A

Multipartite Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

fake source address packets.

A

IP Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

holes in software that’s running on our
servers.

A

Application-Layer Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

miniature programs contain viruses, or snoop, or spyware programs.

A

Active-X Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

a rootkit to probe, scan, and then capture data.

A

Autorooters

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

hacker can use their previously placed inroads into a
specific host or a network whenever they want to.

A

Backdoors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Hackers gather info on a network
before attacking.

A

Network Reconnaissance

17
Q

capture network traffic, including sensitive data
like passwords.

A

Packet Sniffers

18
Q

Hackers use various methods to steal
passwords.

A

Password Attacks

19
Q

tries every possible password to gain
access.

A

Brute-Force Attacks

20
Q

redirect network traffic to a
compromised system, bypassing firewalls.

A

Port-Redirection Attacks

21
Q

exploit internal network trust to
access sensitive systems.

A

Trust-Exploitation Attacks

22
Q

Intercepted data is read by a third
party during transmission.

A

Man-in-the-Middle Attacks

23
Q

a lot like viruses—only worse, can actively replicate
without requiring you to do anything like open an infected file.

A

Worms

24
Q

are unauthorized wireless networks set up within a secure network. These can be accidental or intentional. They pose a serious security risk, especially for man-in-the-middle attacks.

A

Rogue Access Points

25
Q

is when Hackers often trick users into revealing sensitive information. Common tactics include fake
emails, phone calls, or in-person interactions. These attacks relyon deception and exploit trust to steal personal data.

A

Social Engineering (Phishing)

26
Q

MITIGATION TECHNIQUES

involves constantly scanning the network for possible break-ins. Special network software like Cisco’s NetRanger offers real-time intrusion detection.

A

Active Detection

27
Q

Involves logging all network events to a
file. This provides historical data that can be accessed for later review and analysis.

A

Passive Detection

28
Q

Focuses on preventing breaches in ecurity through solid research and maintenance by being udated on any known vulnerabilities and applying patches to them accordingly. It also involves the use of tools to identify and fix said security holes before they can be exploited.

A

Proactive Detection

29
Q

A company should have written policies to effectively enable security on their computer networks.

A

Policies and Procedures

30
Q

should precisely define how security is to be implemented within an organization and include physical security, document security, and network security.

A

Security Policies

31
Q

Security Policies

a thorough examination of your network that
includes testing all its components to make sure everything is secure.

A

Security Audit

32
Q

Security Policies

requiring that all potentially important documents like books, schematics, confidential letters, notes to self, and so on are not left out in the open when someone is away from their desk.

A

Clean-Desk Policy

33
Q

Security Policies

like tape recorders, cell phones, and small-
memory devices like, that can contain sensitive, confidential information should prohibit their unauthorized presence and use.

A

Recording Equipment