Chapter 7 Protecting Against Advanced Attacks Flashcards
____ attacks typically include sustained, abnormally high network traffic
DDoS
_______ occurs when one person or entity impersonates or masquerades as someone or something else.
Spoofing
____ flood attacks disrupt the TCP handshake process and can prevent legitimate clients from connecting.
SYN
True or False: In a SYN attack, the attacker never finishes the handshake sequence
True
The attacker floods the server with SYN packets but never sends the final ACK packets
True or False: Attackers often spoof the source IP address when conducting SYN flood DoS attacks
True
A ________ attack is a form of active interception or active eavesdropping. It uses a separate computer that accepts traffic from each party in a conversation and forwards the traffic between the two.
man-in-the-middle(MITM)
_____ ______ is one way that an attacker can launch an MITM attack.
Address Resolution Protocol (ARP) poisoning
Kerberos helps prevent man-in-the-middle attacks with ______ ______.
mutual authentication
______ ______ is an attack that misleads computers or switches about the actual MAC address of a system.
ARP poisoning
_____ resolves the IP addresses of systems to their hardware address and stores the result in an area of memory known as the ARP cache.
ARP
True or False : The ARP request broadcasts the MAC address and essentially asks, “Who has this MAC address?”
False
It broadcasts the IP address
True or False : The computer with the IP address in the ARP request responds with its MAC address. The computer that sent the ARP request caches the MAC address for the IP.
True
True or False : In a man-in-the-middle attack, an attacker can redirect network traffic and, in some cases, insert malicious code.
True
An attacker can also use ARP poisoning in a ____attack.
DoS
The ____ ____ is the IP address of a router connection that provides a path out of the network.
default gateway
True or False : If all the computers cache a bogus MAC address for the default gateway, a few of them can reach it.
False
None of them can reach the default gateway and it stops all traffic out of the network.
A ___ ____ attack attempts to modify or corrupt DNS results.
DNS poisoning
True or False : Many current DNS servers use Domain Name System Security Extensions(DNSSEC) to protect the DNS records and prevent DNS poisoning attacks.
True
A ______ attack is another type of attack that manipulates the DNS name resolution process.
pharming
True or False : Pharming attacks on the client computer modify the hosts file used on Windows systems.
True
An _____ _____ is a type of DDoS attack which typically uses a method that significantly increases the amount of traffic sent to, or requested from, a victim.
amplification attack
A _____ attack spoofs the source address of a directed broadcast ping packet to flood a victim with ping replies.
smurf
__ amplification attacks send DNS requests to DNS servers spoofing the IP address of the victim.
DNS
True or False : DNS poisoning attacks attempt to corrupt DNS data.
True