Chapter 17 Preventing and Responding to Incidents Flashcards
Any event that has a negative effect on the confidentiality, integrity, or availability of an organization’s assets is called what ?
An incident
The result of an attack, or the result of malicious or intentional actions on the part of users is called what ?
computer security incident
What are the five steps involved in managing incident response ?
1 Detection 2 Response 3 Mitigation 4 Reporting 5 Recovery 6 Remediation 7 Lessons Learned
What type of attack doesn’t attack the victim directly, but instead manipulates traffic or a network service so that the attacks are reflected back to the victim from other sources ?
distributed reflective denial-of-service (DRDoS) attack
What type of attack disrupts the standard three-way handshake used by TCP to initiate communication sessions.
SYN flood attack
What is a method of blocking SYN flood attack ?
Reduce the amount of time a server will wait for an ACK, using SYN cookies.
What type of attack is a spoofed broadcast ping request using the IP address of the victim as the source IP address.
smurf attack
What type of attack floods the victim with Internet Control Message Protocol (ICMP) echo packets instead of with TCP SYN packets ?
smurf attack
In what type of attack does the attacker sends the echo request out as a broadcast to all systems on the
network and spoofs the source IP address ?
smurf attack
What standard changed the standard
default for routers so that they do not forward directed broadcast traffic ?
RFC 2644
What attack will broadcast a UDP
packet using the spoofed IP address of the victim ?
Fraggle attacks
What type of attack employs an oversized ping packet ?
ping-of-death attack
In what type of attack does an attacker fragments traffic in such a way that a system is unable to put data packets back together ?
teardrop attack
In what type of attack does the attacker sends spoofed SYN packets to a victim using the victim’s IP address as both the source and destination IP address ?
land attack
What method of detection uses a database of known attacks developed by the IDS vendor ?
Knowledge-based Detection
What type of responses can modify the environment by modifying ACLs to block traffic based on ports, protocols, and source addresses, and even disabling all communications over specific cable segments ?
a) Passive Response
b) Active Response
Active Response
An IDS that uses an active response is sometimes referred to as _______ .
IPS
What type of IDS monitors specific application traffic between two or more servers ?
application-based IDS,
Which are more costly to manage HIDS or NIDS ?
HIDS
Can a NIDS monitor the content of encrypted traffic ?
No