Lesson 8 Flashcards

1
Q

Passive packet sniffing

A

Actor intercepts and examines data packets as they travel to and from a network without actually participating in the communication or modifying the packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

How can you protect against a malicious packet sniffer?

A

By using a VPN (virtual private network)
to encrypt data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

IP spoofing

A

A type of DDoS attack. It overwhelms the target with traffic while masking the Malicious source. Attackers modify the source IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Smurf attack

A

Type of DDoS attack. It occurs at the network layer, it interrupts the service by saturating the target with a large volume of unnecessary traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Active packet sniffing

A

Packets are manipulated in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ICMP flood

A

A type of DoS attack performed by an attacker repeatedly sending ICMP request packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

On-path attack

A

An attack where a malicious actor places themselves in the middle of an authorized connection and intercepts or alters data in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Replay attack

A

A network attack performed when an attacker interrupts data in transit and delays or repeats it at another time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Brute force attack

A

Trial and error process of discovering private info.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Simple brute force

A

Tries to guess password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Dictionary attack (brute force)

A

Uses a list of commonly used passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Virtual machines (vms)

A

Software versions of physical computers, used to run code in an isolated environment. They can be deleted and replaced after testing malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Sandbox environments

A

A type of testing environment that allows you to execute software or programs separate from your network used for testing patches.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Salting and hashing

A

Hashing converts info into an untie value that dance used to determine the integrity. Salting adds random characters to hashed passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

CAPTCHA

A

Completely automated public turing to tell computers and humans apart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly