Module 15: Security considerations Flashcards

1
Q

this includes:

re-formatting a hard drive or changing data such as the price of an item

A

describe

data loss and manipulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

describe a

TCP half open

A

this is where a server sends a SYN/ACK and is waiting for the ACK reply from the client

NOTE

while the server is in this state memory is consumed as well as network resources since multiple SYN/ACKS will be sent by the server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A security tool that controls traffic to and from a network. based on rules

A

describe a

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

this is where a server sends a SYN/ACK and is waiting for the ACK reply from the client

NOTE

while the server is in this state memory is consumed as well as network resources since multiple SYN/ACKS will be sent by the server

A

describe a

TCP half open

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

name 2 common types of

Denial of Service (DoS)

A

these include:

  1. SYN (Synchronous) flooding
  2. ping of death
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

software is installed on an end-user workstation to detect and remove spyware and adware.

A

describe

anti-spyware software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Software is installed on an end-user workstation or server to identify and remove unwanted emails.

A

describe

spam blockers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

describe

information theft

A

this involves:

stealing personal or propietary information that may then be sold on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

describe

popup blocker

A

Software is installed on an end-user workstation to prevent popup and pop-under advertisement windows from displaying.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

this is a DoS attack where:

a packet crafted that is larger than the 65,535 bytes that IP allows. these packets can cause a system to crash

A

describe briefly the

ping of death

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

describe

SYN (Synchronous) flooding

A

this DoS attack is composed of:

  • an attacker crafs a TCP SYN packet with a fake source IP address
  • the server tries responding to the TCP SYN with a TCP SYN/ACK
  • because the source IP was fake the server is left waiting in a half open state, consuming memory and resources
  • the server will send multiple SYN/ACKS to the fake address before it timesout
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

this DoS attack is composed of:

  • an attacker crafs a TCP SYN packet with a fake source IP address
  • the server tries responding to the TCP SYN with a TCP SYN/ACK
  • because the source IP was fake the server is left waiting in a half open state, consuming memory and resources
  • the server will send multiple SYN/ACKS to the fake address before it timesout
A

describe

SYN (Synchronous) flooding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

this is an intruder who has or is attempting to gain access to a network in order to carry out an attack

A

describe a

threat actor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

describe

identity theft

A

this includes:

stealing a persons personal information so that they may take on their identity and apply for credit, documents such as a pasport or make online transactions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

the attacks they may undertake are:

  1. information theft
  2. data loss and manipulation
  3. identity theft
  4. distruption of service
A

name 4 types of attack a

threat actor

may undertake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

describe a

firewall

A

A security tool that controls traffic to and from a network. based on rules

17
Q

this includes:

stealing a persons personal information so that they may take on their identity and apply for credit, documents such as a pasport or make online transactions

A

describe

identity theft

18
Q

describe

anti-spyware software

A

software is installed on an end-user workstation to detect and remove spyware and adware.

19
Q

Software is installed on an end-user workstation to prevent popup and pop-under advertisement windows from displaying.

A

describe

popup blocker

20
Q

describe

data loss and manipulation

A

this includes:

re-formatting a hard drive or changing data such as the price of an item

21
Q

describe

spam blockers

A

Software is installed on an end-user workstation or server to identify and remove unwanted emails.

22
Q

describe

distruption of service

A

this includes:

distrupting the network in a way that it becomes unavailable to ordinary users, DoS is such an attck

23
Q

software is installed on an end-user workstation or server to detect and remove viruses, worms, and Trojan horses from files and email.

A

describe

anti-virus software

24
Q

Software that is applied to an OS or application to correct a known security vulnerability or add functionality.

A

describe

patches and updates

25
Q

describe briefly the

ping of death

A

this is a DoS attack where:

a packet crafted that is larger than the 65,535 bytes that IP allows. these packets can cause a system to crash

26
Q

describe a

threat actor

A

this is an intruder who has or is attempting to gain access to a network in order to carry out an attack

27
Q

describe

patches and updates

A

Software that is applied to an OS or application to correct a known security vulnerability or add functionality.

28
Q

name 4 types of attack a

threat actor

may undertake

A

the attacks they may undertake are:

  1. information theft
  2. data loss and manipulation
  3. identity theft
  4. distruption of service
29
Q

this involves:

stealing personal or propietary information that may then be sold on

A

describe

information theft

30
Q

these include:

  1. SYN (Synchronous) flooding
  2. ping of death
A

name 2 common types of

Denial of Service (DoS)

31
Q

this includes:

distrupting the network in a way that it becomes unavailable to ordinary users, DoS is such an attck

A

describe

distruption of service

32
Q

describe

anti-virus software

A

software is installed on an end-user workstation or server to detect and remove viruses, worms, and Trojan horses from files and email.