Objective 3a Flashcards

1
Q

What are the primary network threat categories?

A

Unstructured Threats, Structured Threats, Internal Threat, External Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Unfocused attacks on one or more network systems

A

Unstructured Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Focused by one or more individuals with high skills actively working to compromise a specific system

A

Structured Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Originate from individuals who have (or had) authorized access to network

A

Internal Threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Threats from individuals outside organization often attacking through Internet

A

External Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the network attack categories?

A

Reconnaissance Attack, Access Attack, Denial-of-service (DoS) Attacks, Data Manipulation Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Unauthorized user attempts to gain as much information about network before launching other more serious types of attacks

A

Reconnaissance Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Individual attempts to gain unauthorized access of computer resources

A

Access Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Primary purpose is to deny access to system or network by bombarding it with traffic

A

Denial-of-Service (DoS) Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Often called “man-in-the middle” attacks

A

Data Manipulation Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Group of computers connected to Internet having been compromised by hacker using computer virus or Trojan

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an individual botnet computer known as?

A

Zombie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Attacker obtains key used to interpret secured information

A

Compromised-Key Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Software designed to spread from one infected computer to another

A

Computer Virus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Software designed to replicate itself from one computer to another without human interaction

A

Computer Worm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Attacker gains access to communication lines using sniffer to read (aka “listen to’’) network traffic

A

Eavesdropping

17
Q

Attacker falsely assumes valid IP address for system on network giving appearance they are legitimate user inside corporate intranet

A

Identity Spoofing (IP Address Spoofing)

18
Q

Program created to spy on victims, recorded information is sent back to originator via Internet

A

Malicious Spyware

19
Q

Term refers to any code used in malicious manner to include being intrusive or annoying

20
Q

Eavesdroppers gain access to network when older applications did not encrypt identity information

A

Password-Based Attacks

21
Q

Message attempts to lure victim into giving personal information or by clicking lick in email to verify information

22
Q

Asks user to click on provided link to install update or remove malicious software

A

Rogue Security Software

23
Q

Collection of hacking tools used to obtain administrator-level access to computer system or network

24
Q

Unwanted email messages

25
Q

Infects computers by user downloading application they thought legitimate but was in fact malicious

26
Q

Any circumstance or event that may compromise system or data it contains

27
Q

Attacks begin from inside of organization (Malicious/Non-Malicious)

A

Internal Threats

28
Q

Weakest link in any security system

29
Q

May result in extended processing delays and/or inability to have mission critical communications

A

Equipment & Software Failures