IS4560 T&D CH 12 Flashcards
1
Q
- The process of searching for and identifying a session and taking it over in order to interact with the victim’s system. Performed on networks where switches are in play.
A
Active session hijacking
2
Q
- The process of sniffing network traffic when a switch is involved and splitting the network into different logical collision domains.
A
Active sniffing
3
Q
- The process of overwhelming a switch with bogus MAC addresses in an attempt to exceed the limitations of a switch.
A
Address Resolution Protocol (ARP) poisoning
4
Q
- A group of infected systems that are used to collectively attack another system.
A
Botnet
5
Q
- The act of engaging in crime through the use of a computer or similar type of device.
A
Collision domain
6
Q
- The memory present on a switch that is used to look up the MAC address to port mappings that are present on a network.
A
Content addressable memory (CAM)
7
Q
- A failure response resulting in open and unrestricted access or communication.
A
Fail-open
8
Q
- A simple device that connects networks; it possesses no intelligence, so broadcasts received on one port are transmitted to all ports.
A
Hub
9
Q
- A logical construct in memory that allows a switch to locate which MAC address is located on which port on the switch.
A
Lookup table
10
Q
- The process of locating and identifying a session and taking it over, but instead of interacting with the victim the attacker just observes.
Performed on networks in which a hub is present.
A
Passive session hijacking
11
Q
- The process of sniffing on a network that has a hub. It does not transmit data on the network and is therefore hard to detect.
A
Passive sniffing
12
Q
- The process of locating and identifying a session and taking it over.
A
Session hijacking
13
Q
- A device used to break a network into logical network segments known as collision domains.
A
Switch
14
Q
- An effort to break something such as a password by using all possible combinations of characters until a combination works.
A
Brute-force attack
15
Q
- A special mode that a network card can be switched to that will allow the card to observe all traffic that passes by on the network, not just the traffic addressed to the specific network card.
A
Promiscuous mode