Securing Individual Systems Flashcards

1
Q

What attack prevents others from accessing a system and comes from a single source?

A

Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Denial of service can be broadly broken down into what three categories?

A

Volumetric, Protocol, Application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which type of DoS saturates the bandwidth of the attacked site to prevent other users from being able to access it?

A

Volumetric

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which type of DoS attack is comprised of seemingly legitimate and innocent requests but ultimately crashes the server?

A

Application attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which type of DoS attack consumes the server resources?

A

Protocol attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What attack prevents others from accessing a system and comes from multiple sources?

A

Distributed denial-of-service attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which attack leverages the functionality of open DNS resolver in order to overwhelm a target server or network with an amplified amount of traffic, rendering the server and its surrounding infrastructure inaccessible.

A

Amplification attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

unsolicited emails

A

Spam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

fraudulent attempt to obtain sensitive information usually through emails

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

phishing attempts directed at specific individuals or companies (email contains the individual’s name or the company’s name.

A

Spear Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

receive Spam via instant messaging

A

Spim

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

unsolicited use of voice trying to get information from you (phone calls)

A

Vishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

technique of tricking a user into clicking on something different from what the user perceives

A

Clickjacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

form of cybersquatting (sitting on sites under someone else’s brand or copyright) that targets Internet users who incorrectly type a website address into their web browser

A

Typosquatting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

the act of changing the registration of a domain name without the permission of its original registrant, or by abuse of privileges on domain hosting and registrar software systems.

A

Domain Hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

the act of exploiting a bug, design flaw or configuration oversight in an operating system or software application to gain elevated access to resources that are normally protected from an application or user

A

Privilege Escalation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Third party intercepting between a two-party conversation

A

Man-in-the-middle attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

when a hacker impersonates another device or user on a network in order to steal data, spread malware, or bypass access controls.

A

Spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Attack in which a third-party intercepts between a two-party conversation

A

Man-in-the-middle attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed

A

Replay attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

attack on a computer system or communications protocol that makes it abandon a high-quality mode of operation (e.g. an encrypted connection) in favor of an older, lower-quality mode of operation (e.g. cleartext) that is typically provided for backward compatibility with older systems

A

Downgrade attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

the exploitation of a valid computer session—sometimes also called a session key—to gain unauthorized access to information or services in a computer system

A

Session hijacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

a packet sniffer to intercept unencrypted session cookies from websites such as Facebook and Twitter. The plugin eavesdropped on Wi-Fi communications, listening for session cookies

A

Firesheep

24
Q

ability of the system to withstand a major disruption within acceptable degradation parameters and to recover within an acceptable time

A

System Resiliency

25
Q

capability of a system, network, or process to handle a growing amount of work, or its potential to be enlarged to accommodate that growth

A

Scalability

26
Q

the ability to expand and contract your network system depending on demand

A

Elasticity

27
Q

system design in which a component is duplicated so if it fails there will be a backup

A

Redundancy

28
Q

scattering systems into different areas instead of one central location

A

Distrubutive Allocation

29
Q

allows you to host one or more virtual systems, or virtual machines (VMs), on a single physical system

A

Virtualization

30
Q

data that is collected but will not be saved on restart

A

Non-persistence

31
Q

a copy of the live current environment

A

Snapshot

32
Q

returning to a state of data before edits or changes were implemented; Windows restore points

A

Revert to a Known State

33
Q

go back to a previous version; Drivers usually have this feature

A

Rollback

34
Q

a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both

A

RAID (Redundant Array of Independent Disks)

35
Q

a data storage virtualization technology that combines multiple physical disk drive components into one or more logical units for the purposes of data redundancy, performance improvement, or both

A

RAID ( Redundant Array of Independent Disks)

36
Q

Which RAID version provides fast input/output performance for reading and writing but no fault tolerance?

A

RAID-0

37
Q

Which RAID provides fault tolerance and a slight increase in read performance, but no increase in write performance?

A

RAID-1

38
Q

Which RAID provides fault tolerance and will continue to operate even if a single drive fails and also provides an increase in read performance, but no increase in write performance?

A

RAID-5

39
Q

Which RAID requires a minimum of three disks?

A

RAID-5

40
Q

Which RAID is an extension of RAID-5 that includes an additional parity block?

A

RAID-6

41
Q

Which RAID provides fault tolerance and will continue to operate even if two drives fail and an increase in read performance?

A

RAID-6

42
Q

Which RAID requires a minimum of four disks?

A

RAID-6

43
Q

Which RAID provides fault tolerance and will continue to operate even if multiple drives fail and provides an increase in both read and write performance and is ideal for many database server applications?

A

RAID-10

44
Q

Which RAID requires a minimum of four disks?

A

RAID-10

45
Q

Which sharing protocol is file-based?

A

NAS (Network Attached Storage)

46
Q

Which sharing protocol is block-level based?

A

SAN (Storage Area Network)

47
Q

Which sharing protocol uses SAMBA?

A

NAS

48
Q

Which sharing protocol can use either Fiber Channel or iSCSI?

A

SAN

49
Q

high-speed typology that has been built specifically for SAN’s; built to connect servers directly to storage devices

A

Fiber Channel

50
Q

connects a computer, which acts as the host system, to other network and storage devices

A

Host Bus Adapter (HBA)

51
Q

makes remote drives on the storage area network look and feel as if they are local to your computer

A

iSCSI (Internet Small Computer Systems Interface)

52
Q

What can be used on a windows machine to control how system hardware acts or reacts to an action?

A

Policies

53
Q

Where do you go on a Windows machine to enable/disable DEP (Data Execution Prevention)?

A

System - Advanced - Performance Settings - Data Execution Prevention

54
Q

Where do you go on a windows machine to disable ports?

A

BIOS settings

55
Q

The interference caused by an electromagnetic disturbance affecting the performance of a device, transmission channel, or system

A

EMI (Electromagnetic Interference)

56
Q

an EMI when the interference is in the radio frequency spectrum

A

RFI (Radio Frequency Interference)

57
Q

a difference of potential between two items that causes static electricity

A

ESD (Electrostatic Discharge)