Module 3 Flashcards

1
Q

Common Network Intrusion Attacks

A

Malware

Spoofing

Packet Sniffing

Packeting Flooding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Attacks Can Harm An Organization By

A

Leaking valuable or confidential information

Damaging an organizations reputation

Impacting customer retention

Costing money and time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Denial of Service Attack (Dos)

A

An attack that targets a network or server and floods it with network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Distributed Denial of Service Attack (DDoS)

A

A type of denial of service attack that uses multiple devices or servers in different locations to flood the target network with unwanted traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SYN (synchronize) Flood Attack

A

A type of DoS attack that simulates a TCP connection and floods a server with SYN packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Internet Control Message Protocol (ICMP)

A

An Internet protocol used by devices to tell each other about data transmission errors across the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Internet Control Message Protocol (ICMP) Flood

A

A type of DoS attack performed by an attacker repeatedly sending ICMP packets to a network server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ping of Death

A

A type of DoS attack caused when a hacker pings a system by sending it an oversized ICMP packet that is bigger than 64kb.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Passive Packet Sniffing

A

A type of attack where data packets are read in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Active Packet Sniffing

A

A type of attack where data packets are manipulated in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

IP Spoofing

A

A network attack performed when an attacker changes the source IP of a data packet to impersonate an authorized system and gain access to a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Common IP Spoofing Attacks

A

On-path attack

Replay attack

Smurf attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

On-Path Attack

A

An attack where a malicious actor places themselves in the middle of an authorized connection and intercepts or alters the data in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Replay Attack

A

A network attack performed when a malicious actor intercepts a data packet in transit and delays it or repeats it at another time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Smurf Attack

A

A network attack performed when an attacker sniffs an authorized users IP address and floods it with packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly