Chapter 7: Protecting Against Advanced Attacks Flashcards
A ____ attack is an attack launched from a single system and attempts to disrupt services.
DoS
____ attacks are DoS attacks from multiple computers. DDoS attacks typically include sustained, abnormally high network traffic.
DDoS
_____ attacks attempt to impersonate another system.
Spoofing
MAC address spoofing changes the ___ ___ ____ and IP spoofing changes the ____ ____ ____.
source MAC address
source IP address
____ ____ attacks attempt to mislead computers or switches about the actual MAC address of a system. They can be used to launch a man-in-the-middle attack.
ARP poisoning
____ ____ attacks modify DNS data and can redirect users to malicious sites. Many DNS servers use DNSSEC to protect DNS records and prevent these attacks.
DNS poisoning
____attacks send increased traffic to, or request additional traffic from, a victim.
Amplification
_____ attacks attempt to discover passwords.
Password
A _____ ____ attack attempts to guess all possible character combinations and a _____ attack uses all the words and character combinations stored in a file.
brute force
dictionary
____ ____ policies thwart online brute force attacks and complex passwords thwart offline password attacks.
Account lockout
Passwords are often stored as a____. Weak hashing algorithms are susceptible to collisions, which allow different passwords to create the same hash.
hash
In a ___ ___ ___ attack, the attacker discovers the hash of the user’s password and then uses it to log on to the system as the user.
pass the hash
In a____ attack, an attacker is able to create a password that produces the same hash as the user’s actual password. This is also known as a hash collision.
birthday
A ____ ____ occurs when the hashing algorithm creates the same
hash from different passwords.
hash collision
Password_____ adds additional characters to passwords before hashing them and prevents many types of attacks, including dictionary, brute force, and rainbow table attacks.
salting
____attacks capture data in a session with the intent of using information to impersonate one of the parties. Timestamps and sequence numbers thwart these attacks.
Replay
A known plaintext attack is possible if an attacker has both the _____ and the ____ created by encrypting the plaintext. It makes it easier to decrypt other data using a similar method.
plaintext and the ciphertext
Attackers buy domain names with minor typographical errors in ____ ____(also called URL hijacking) attacks. The goal is to attract traffic when users enter incorrect URLs. Attackers can configure the sites with malware to infect visitors or configure the site to generate ad revenue for the attacker.
typo squatting
____tricks users into clicking something other than what they think they’re clicking.
Clickjacking