Cyber Attacks Flashcards

1
Q

Wiretapping

A

Attacker eavesdrops on a network to acquire information normally at physical layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Port scanning

A

When an attacker uses a software like nmap that sends thousand of tcp/ip packets to well known ports to see if they’re open and tells a hacker what service or app is running on a system. This can be stopped by packet filtering firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ARP poisoning

A

Used to manipulate arp cache system mapping of MAC addresses
They send incorrect MAC addresses to a system
Tricks a switch into redirecting traffic to the hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Man in the middle

A

Impersonate both the sender and the receiver intercepting all traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Ping of death

A

Attacker sends an icmp packet that’s too large and causes the system to crash or stop functioning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Ping flood

A

Attacker overwhelms victims computer with a large amount of icmp echos or ping request to overload, crash or slow down the system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Smurf attack

A

A DDOS ATTACK that is sent to a broadcast ip address connected to all the computers on a network. The attacker spoofs the return address to the victim. The victim is bombarded with reply’s from other computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Mitigate ddos attacks

A

Packet filtering firewall that blocks icmp packets over a certain number of block all icmp packets together

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

SQL injection

A

An attacker is trying to obtain info from or take over a database
They enter sql commands into input boxes instead of basic text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Buffer overflow

A

When an attacker enters text that is too large to fit within a region of memory called a buffer allowing the attacker to retrieve it from a different region in the database

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Botnet

A

Malware that can takeover a pc allowing it to be remotely controlled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly