Security - Attacks Flashcards

1
Q

DoS

A

Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

DDoS

A

Distributed Denial of Service Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Social Engineering

A

Intruder gains information from users to gain access to network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Phishing

A

Form of social engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Password Cracking

A

Brute-force attack - every possible combination of characters
Dictionary attack - variations of known passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Packet Sniffing

A

Intercepts unencrypted packets to find username / password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Man-in-the-middle

A

Attacker in the middle of a conversation

ARP cache poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ARP cache poisoning

A

Form of man-in-the-middle

Redirect conversations to attacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Evil Twin

A

Form of man-in-the-middle

Poses as legitimate WAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Session Hijacking

A

Form of man-in-the-middle

Hijack an active network session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

VLAN Hopping

A

Form of man-in-the-middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Buffer Overflow

A

Instructions can be ran or application will crash.

Backdoor entry can cause

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Virus

A

Malicious computer code

Spreads from system to system by user action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Worm

A

Self-replicating virus

Usually establishes a backdoor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Malware

A

Malicious programs intended to harm, disrupt, deny, or gain unauthorized access to a machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Logic Bomb

A

Resides in a system until trigger sets it off

17
Q

Zero-day Attack

A

Exploits software vulnerability unknown to developer

18
Q

Ransomware

A

Form of malware

Encrypts files and demands ransom

19
Q

Teardrop

A

Form of DoS

Fragmented packets sent to target. Machine crashes after being unable to reassemble packets.

20
Q

SYN Attack

A

Form of DoS

Multiple TCP SYN packets sent to overwhelm host’s memory

21
Q

Smurf

A

Form of DoS

Initiate broadcast messages with spoofed address that appears to be within the network

22
Q

PDoS

A

Permanent DoS

Malicious, renders hardware useless

23
Q

Spoof

A

Using a trusted IP address

24
Q

Reflective / amplified DoS

A

Spoof an IP address, send multiple requests, overwhelming responses sent to spoofed address

25
Q

Coordinated Attack

A

Form of DDoS

Orchestrated to a specific target

26
Q

Botnet

A

Form of DDoS

Group of infected computers attack another computer / system