comptia Flashcards
Vishing
Social engineering over telephone
Phishing
Fraud Attack to obtain information, e.g through email prompting users to do something
Watering hole attack
infecting websites a group of people access to obtain specific information, targeted attack
scarcity
business choices to manage the availability of resources to meet human needs
bluesnarfing
Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection
DoS Attack
denial-of-service attack is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.
- Ping of death
- buffer overflow
- IP Spoofing
- consumes bandwidth
A sacrificial server on a network to gather
information about intruders. What is this called?
Honeypot
A policy that only allows compliant devices to join their network.
Quarantine Network
What type of firewall inspects packets to identify VALID communications?
Stateful Inspection Firewall
All viruses are malware - TRUE?
Yes
acronym which describes the duration after which an organisation’s viability
will be permanently threatened, if product and service delivery CANNOT be
resumed?
MTPOD (Maximum tolerable period of disruption)
measure of the maintainability of repairable items. It represents the average time required to repair a failed component or device
MTTR (mean-time to repair)
the interval of time that might pass during a disruption before the quantity of data lost during that period exceeds the Business Continuity
RPO (Recovery Point Objective)
the duration of time and a service level within which a business process must be restored after a disaster in order to avoid unacceptable consequences associated with a break in continuity.
RTO (Recovery Time Objective)
Which protocol can automatically provide the IP address, subnet mask, default
gateway IP and DNS server IP to a client on a data network?
DHCP
Which feature prevents infected files being installed on a device?
Driver Signature Enforcement
What is used to encrypt files on Microsoft
EFS (Encryption file system)
A network engineer monitors a firewall and notices several suspicious packets have
been dropped. What is in place on the firewall?
IPS
security protocol and is also one of the
secure encryption systems used in data communication?
Kerberos
Which type of tool is used to find modems on networks to initiate an attack from?
War-Dialler
NIDS
Network - Intrusion Detection System
Short for network intrusion detection system, NIDS is a system that attempts to detect hacking activities, denial of service attacks or port scans on a computer network or a computer itself. … The NIDS can monitor incoming, outgoing, and local traffic.
NTFS
journaling file system developed by Microsoft
a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed
Replay Attack
alters the communications between two parties who believe that they are directly communicating with each other.
MITM Attack
Which of the following attacks relies on intercepting and altering data sent between two networked hosts?
MITM attack
A type of exploit that relies on overwriting contents of memory to cause unpredictable results in an application is known as
Buffer Overflow