IS4560 T&D CH 12 Flashcards

1
Q
  • The process of searching for and identifying a session and taking it over in order to interact with the victim’s system. Performed on networks where switches are in play.
A

Active session hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  • The process of sniffing network traffic when a switch is involved and splitting the network into different logical collision domains.
A

Active sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
  • The process of overwhelming a switch with bogus MAC addresses in an attempt to exceed the limitations of a switch.
A

Address Resolution Protocol (ARP) poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
  • A group of infected systems that are used to collectively attack another system.
A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  • The act of engaging in crime through the use of a computer or similar type of device.
A

Collision domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  • The memory present on a switch that is used to look up the MAC address to port mappings that are present on a network.
A

Content addressable memory (CAM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
  • A failure response resulting in open and unrestricted access or communication.
A

Fail-open

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  • A simple device that connects networks; it possesses no intelligence, so broadcasts received on one port are transmitted to all ports.
A

Hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • A logical construct in memory that allows a switch to locate which MAC address is located on which port on the switch.
A

Lookup table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • The process of locating and identifying a session and taking it over, but instead of interacting with the victim the attacker just observes.
    Performed on networks in which a hub is present.
A

Passive session hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • The process of sniffing on a network that has a hub. It does not transmit data on the network and is therefore hard to detect.
A

Passive sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
  • The process of locating and identifying a session and taking it over.
A

Session hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • A device used to break a network into logical network segments known as collision domains.
A

Switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • An effort to break something such as a password by using all possible combinations of characters until a combination works.
A

Brute-force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • A special mode that a network card can be switched to that will allow the card to observe all traffic that passes by on the network, not just the traffic addressed to the specific network card.
A

Promiscuous mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly