Threats and Vulnerabilities Flashcards

1
Q

DOS (Denial of Service)

A

attack that attempts to make a computers resources unavailable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Flood Attack

A

specialized type of denial of service that attempts to send more packets to a server or host than it can handle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

ping flood

A

type of flood attack in which too many ICMP echo requests are being sent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

syn flood

A

type of flood attack in which attacker initiates multiple tcp sessions but never completes threeway handshake

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How Can flood attacks be mitigated

A

Flood Guards- detect syn floods and block requests, Timeouts- timeout on a half open request, IPS (intrusion prevention systems)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Permanent Denial of Service (PDOS)

A

exploits a security flaw to permanently break a networking device, rebooting wont fix the break , reflashes firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

fork bomb/rabbit attack

A

attack that creates many processes to use up available processing power of a computer, not a worm, only spread out inside processors cache on a single computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DDOS (distributed Denial of Service)

A

use lots of machines to attack a server to create denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DNS Amplification

A

allows attacker to send packets to flood victims website to initiate DNS requests from a spoof version of targets IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How to mitigate or beat DDOS?

A

blackwhole/sinkhole- reroutes attacking IP addresses and routes them to a nonexistent server through null interface
IPS- identify and respond to small scale DDOS attacks
Elastic Cloud infrastructure- scale up when demand increases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

spoofing

A

when attacker masquerades as another person by falsifing their identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IP Spoofing

A

modifies source address of an IP packet to hide the identity of sender or impersonate another client or both, layer 3 of the OSI model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MAC Address Spoofing

A

changing mac address to pretend the use of a different NIC Or device, layer 2 of the OSI model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

On path attack

A

AKA man in the middle attack, attackers put themselves logically between the victim and the intended destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ARP poisoning

A

on path attack on local IP subnet in which the attacker sends their own mac addresss instead of intended mac address so that you are communicating with them and not the device that you though you were

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DNS Poisoning

A

similar to ARP poisoning but with DNS

17
Q

Rogue WAP

A

types of on path attack

18
Q

Rogue Switch or hub

A

type of on path attack

19
Q

replay

A

valid data is captured by the attacker and is then repeated immediately or delated and then repeated

20
Q

relay

A

attacker inserts themselves in between two hosts, attacker becomes proxy between the two hosts, attacker can read and modify communications

21
Q

SSL stripping

A

attacker tricks encryption application into presenting the user with a http connection instead of a https connection

22
Q

downgrade attack

A

attacker attempts to have a client or server abandon a high security mode in favor for a lower security mode

23
Q

SQL injection

A

attack where insertion of an SQL query via input data from client to web application

24
Q

cross site scripting (XXS)

A

attacker embeds malicious scripting commands on a trusted website, attacker is trying to elevate privileges, steal information from victims cookies or gain information stored by victims web browser,

25
Q

How can user prevent XXS attacks

A

increasing security settings for cookie storage and disabling scripting languages when browsing the web

26
Q

XXSRF (cross site request forgery)

A

attacker forces a user to execute actions on a webserver for which they are already authenticated

27
Q

how to prevent XXSRF attacks?

A

Captchas
tokens
xml file scanning
encryption
cookie verification