CHP 5 Sec+ Flashcards

1
Q

Man in the middle

A

Attack by intercepting legitimate
communication and forging a fictitious response to the sender.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Man in the browser

A

Attack intercepts communication
between parties to steal or manipulate the data. But whereas a MITM attack occurs between two computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Reply Attack

A

Attack is a variation of a MITM attack. Whereas a MITM attack alters and then sends the transmission immediately, a replay attack makes a copy of the legitimate transmission before sending it to the recipient.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Address Resolution Protocol (ARP) Poisoning

A

A cyber attack where a hacker manipulates the Address Resolution Protocol (ARP) in a network, tricking devices into sending data to the attacker instead of the intended recipient

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Domain Name System (DNS) Poisoning

A

A type of cyber attack that manipulates the Domain Name System (DNS) to redirect internet traffic from legitimate servers to malicious ones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Privilege escalation

A

Exploiting a vulnerability in software to gain access to resources that the user normally would be restricted from accessing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Types of Privilege escalation

A

One type is when a user with a
lower privilege uses privilege escalation to grant herself access to functions reserved for higher-privilege users (sometimes called vertical privilege escalation)
Another type of privilege escalation is when a user with restricted privileges accesses the different restricted functions of a similar user; that is, Mia does not have privileges to access a payroll program but uses privilege escalation to access Li’s account that does have these privileges (horizontal privilege escalation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Denial of service (DoS)

A

A deliberate attempt to prevent authorized users from accessing a system. It does this by overwhelming that system with such a very high number of “bogus” requests that the system cannot respond to legitimate
requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Distributed denial of service (DDoS)

A

Instead of only one computer making a bogus request, a DDoS involves hundreds or even tens of thousands of devices flooding the server with requests

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Smurf attack

A

An attacker broadcasts a network request to multiple computers but changes the address from which the request came (called IP spoofing because it imitates another computer’s IP address) to the victim’s computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

SYN Flood Attack

A

Takes advantage of the procedures for initiating a session. Under normal network conditions using TCP/IP, a device contacts a network server with a request that uses a control message, called a synchronize message (SYN), to initialize the connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

SQL Injection

A

Is a type of cyber attack that targets the security of a database-driven website by manipulating the SQL (Structured Query Language) queries. It occurs when an attacker inserts or “injects” malicious SQL code into input fields or parameters used by a web application that interacts with a database.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Session Hijacking

A

An attack in which an attacker attempts to impersonate the user by using her session token

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

URL Hijacking (also called typo squatting)

A

A type of cyber attack in which someone registers a domain name that closely resembles the URL of a legitimate website. The attacker hopes that unsuspecting users will make an error when typing the URL into their browser and go to the malicious site instead of the actual website.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Buffer overflow attacks

A

A type of security vulnerability that occurs when a program or process attempts to store more data in a buffer (a temporary storage area) than it was intended to hold. This extra data can overwrite adjacent memory locations, potentially causing the program to behave unexpectedly or allowing an attacker to execute malicious code.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Integer overflow attacks

A

The result of an arithmetic operation with integers exceeds the maximum value that the data type can store. In programming, integers have a finite range they can represent based on their data type (e.g., 32-bit or 64-bit integers). An integer overflow happens when a value exceeds this maximum limit and “wraps around” to a minimum value, potentially leading to unexpected behavior in software.