Network+ Extra 4 Flashcards

1
Q

A DNS server is often used in an ______________ attack, but other services could be used in the exploit as well. With these attacks, legitimate servers are tricked into flooding responses at a target system; the forged request tends to be small but results in large responses hitting the target.

A

(DoS) Amplification Attack:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

One variant of a DoS attack is for an attacker to initiate multiple TCP sessions by sending SYN segments but then never complete the three-way TCP handshake.

A

TCP SYN FLOOD :

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Power spikes: Excess power for a brief period of time.

Electrical surges: Excess power for an extended period of time.

Power fault: A brief electrical outage.

Blackout: An extended electrical outage.

Power sag: A brief reduction in power.

Brownout: An extended reduction in power.

A

power failure types :

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

DR focuses on getting critical applications back online, and BC focuses on the tasks carried out by an organization to ensure that critical business functions continue to operate during and after a disaster.

A

Disaster Recover / Business Continuity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The sending of unauthorized messages over a Bluetooth connection to a device.

A

Bluejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Provides unauthorized access from a wireless device through a Bluetooth connection.

A

BlueSnarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Creates unauthorized backdoor access to connect a Bluetooth device back to the attacker.

A

Bluebugging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Avoiding common passwords, Upgrading firmware, Patching and updating, File hashing, Disabling unnecessary services, Using secure protocols, Generating new keys, Disabling unused ports. This includes both ports running IP and physical ports themselves, Changing the native VLAN.

A

Network Hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This involves preventing rogue DHCP servers and DHCP pool exhaustion attacks by restricting ports from accepting certain DHCP messages.

A

DHCP Snooping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

is a commonly used protocol between a DSL modem in a home (or business) and a service provider. Specifically, ? encapsulates PPP frames within Ethernet frames. This approach allows an Ethernet connection to leverage the features of PPP, such as authentication.

A

Point-to-Point Protocol over Ethernet (PPPoE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly