quiz 2 Flashcards
Denial-of-service (DoS) attack
an attack against a network resource that aims to prevent, disrupt, or delay authorized users from accessing the network resource
Distributed Denial-of-Service (DDoS) attack
a DoS attack that is simultaneously launched from multiple systems.
Network-based DDoS attack
a DDoS attack that aims to exhaust the target system’s network bandwidth
Protocol-based DDoS attack
a DDoS attack that aims to exhaust the target system’s network resources or the resources of a network infrastructure equipment, such as a firewall or a load balancer. Exploits the weaknesses of network layer (OSI layer 3) and transport layer (OSI layer 4) protocols to create maliciously configured protocol packets.
Application layer DDoS attack
a DDoS attack that aims to exhaust specific functions or features of a program.
Domain name system (DNS)
a hierarchical and decentralized naming system for identifying and locating the resources connected to a network.
DNS resolution
process of translating or resolving a domain name to an IP address
DNS zone
a portion of a DNS namespace that is managed by an administrator or specific organization.
authoritative name server
a DNS server that manages a domain’s configuration, also known as the domain’s DNS record.
Domain reputation
a measure of a domain’s trustworthiness based on historical data on the domain.
Domain hijacking
the act of changing the registration information of a domain without the knowledge or consent of the domain owner.
URL redirection
the act of using a URL to divert a user to a malicious website
DNS poisoning
an attack that aims to redirect a user to a malicious website by modifying the user’s DNS query
Data origin authentication
A DNS client is assured that DNS data originated from the zone owner.
Domain Name System Security Extensions
a set of extensions to DNS that provide a DNS resolver cryptographic authentication of DNS data using digital signatures
Data integrity
A DNS client is assured that DNS data has not been modified in transit.
data link layer
facilitates data transfer between two connected devices on the same network. responsible for flow control and the detection and correction of errors that may occur in the physical layer
media access control (MAC) address
a unique 48-bit identifier assigned to a network device
address resolution protocol (ARP)
a protocol used for resolving an internet address (Layer 3) into a MAC address (Layer 2)
ARP cache table
a table that maps an internet address to the internet address’ corresponding MAC address.
Address resolution protocol (ARP) poisoning
an attack in which an attacker sends spoofed ARP messages on a local area network (LAN) to associate the attacker’s MAC address with the IP address of a target host on the LAN
Media access control (MAC) flooding
an attack in which a large number of invalid MAC addresses are sent to a network switch with the aim of overwriting the switch’s MAC table.
MAC cloning
the act of changing the factory-assigned MAC address of a network device
Man-In-The-Middle (MITM) attack
an attack in which an attacker eavesdrops or modifies the communications between two parties. operates at the network layer (Layer 3)