Network+ Chapter 14 Flashcards
Define a DoS attack? (Denial of Service)
pg 474
prevents users from accessing the network and/ or its resources.
_________ is a Large amount of ICMP packet are sent to the remote host victim, totally flooding the victim’s buffer and causing the system to reboot or helplessly hang there, drowning.
(p. 474).
Ping of Death
patches are available for most operating systems to prevent a Ping of Death attack from working.
What is a botnet?
pg 475
is a number of Internet-connected computers communicating with other similar machines in an effort to complete repetitive tasks and objectives.
What is a smurf attack?
p. 477
DoS attack that floods its victim with spoofed broadcast ping messages.
Define Syn Flood Attack?
p. 478.
Its another DoS attack that inundates the receiving machine with lots of packets that cause the victim to waste resources by holding connections open.
What is a Brute Force Attack?
pg 482
The Hacker attempts every possible combination of numbers and letters that could be in a password.
.
How can you prevent a Brute Force Attack?
p. 482
Setting an account lockout policy is the simplest mitigation technique to defeat brute force attacks. With such a policy applied, the account becomes locked after a set number of failed attempts.
is a term that describes any software that harms a computer, deletes data, or takes actions the user did not authorize.
p. 484
Malicious Software or Malware
__________is one that affects both the boot sector and files on your computer, making such a virus particularly dangerous and exasperatingly difficult to remove.
p. 486
multipartite virus
.
what is one basic tool that a hacker will use to analyze the network? pg489
Packet Sniffer or Protocol Analyzer
is an AP that is not under your control but is used to perform a hijacking attack.
p. 492.
Evil Twin
Both______ and ________exploit others’ Bluetooth connections without their knowledge
pg 493
Bluesnarfing
Bluejacking
.
_________is a method of bypassing normal authentication, securing unauthorized remote access to a computer, obtaining access to plaintext, while attempting to remain undetected.
pg 495
Backdoor attack
describe a packet sniffer?
pg 495
its a software tool that can be incredibly effective in troubleshooting a problematic network, but it can also be a hacker’s friend.
_________is an exploit of the FTP protocol whereby an attacker is able to use the PORT command to request access to ports indirectly through the use of the victim machine as a middle man for the request.
pg 495
FTP Bounce Attack