Core 2: Threats & Vulnerability Flashcards
As opposed to the simple Denial of Service (DoS) attacks that usually are performed from a single system, a Distributed Denial of Service (DDoS) attack uses multiple compromised computer systems to perform the attack against its target.
True or False?
True
An attempt to flood the bandwidth or resources of a targeted system so that it becomes overwhelmed with false requests and in result doesn’t have time or resources to handle legitimate requests is called:
Bluesnarfing
MITM attack
Session hijacking
DoS attack
DoS attack
A type of attack aimed at exploiting vulnerability that is present in already released software but unknown to the software developer is called:
Xmas attack
Zero-day attack
IV attack
Replay attack
Zero-day attack
Which of the following attacks relies on intercepting and altering data sent between two networked hosts?
Zero-day attack
MITM attack
Watering hole attack
Replay attack
MITM attack
An attack against encrypted data that relies heavily on computing power to check all possible password combinations until the correct one is found is known as:
Replay attack
Brute-force attack
Dictionary attack
Birthday attack
Brute-force attack
Which password attack takes advantage of a predefined list of words?
Birthday attack
Replay attack
Dictionary attack
Brute-force attack
Dictionary attack
Rainbow tables are lookup tables used to speed up the process of password guessing.
True or False?
True
Which of the following answers refers to the contents of a rainbow table entry?
Hash/Password
IP address/Domain name
Username/Password
Account name/Hash
Hash/Password
An email sent from unknown source disguised as a trusted source known to the message receiver is an example of: (Select 2 answers)
Spoofing Dictionary attack Trojan horse Brute forcing Social engineering Tailgating
Spoofing
Social Engineering
What kind of general term is used to describe the process of securing a computer system?
Patching
Baselining
Hardening
Auditing
Hardening
Network Access Control (NAC) defines a set of rules enforced in a network that the clients attempting to access the network must comply with. With NAC, policies can be enforced before or after end-stations gain access to the network. NAC can be implemented as pre-admission NAC where a host must, for example, be virus free or have patches applied before it can be allowed to connect to the network, and/or post-admission NAC, where a host is being granted/denied permissions based on its actions after it has been provided with the access to the network.
True
False
True
The intermediary systems used as a platform for a DDoS attack are often referred to as zombies, and collectively as a botnet.
True
False
True