Network Attacks Flashcards

1
Q

Man-in-the-Middle

A

An attacker secretly relays and possibly alters the communications between two unsuspecting parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Logic Bomb

A

A piece of computer code intentionally inserted into system software that will set off a malicious function when specified conditions are met.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

DOS

A

An attempt to overload a system and prevent all legitimate request from being fulfilled.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Spyware

A

Software that aims to gather information about a person or organization with out their knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Phishing

A

A fraudulent attempt to obtain sensitive information by disguising oneself as a trustworthy entity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Rootkit

A

A collection of malicious software designed to enable access to a computer or area of its software that is not allowed, and often masks its existence.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Trojan Horse

A

Malware which misleads users of its true intent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Ransomware

A

A type of malware that threatens to publish or perpetually block access to a persons data unless a ransom is paid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Backdoor

A

A covert method of bypassing normal authentication or encryption in a computer product.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

VLAN Hopping

A

An attacking host on one VLAN gains access to traffic on other VLANs by switch spoofing and double tagging.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly