Threats & Vulnerabilities Flashcards

1
Q

What is the difference between a DoS and a DDoS

A

DoS is typically conducted from a single system, DDoS uses multiple compromised systems to attack the target.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An attempt to flood the bandwidth or resources of a targeted system so that it becomes overwhelmed with false requests and in result doesn’t have time or resources to handle legitimate requests is called:

A

DoS attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A type of attack aimed at exploiting vulnerability that is present in already released software but unknown to the software developer is called:

A

0 day

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following attacks relies on intercepting and altering data sent between two networked hosts?

A

Man in the middle (MITM) attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An attack against encrypted data that relies heavily on computing power to check all possible password combinations until the correct one is found is known as:

A

Brute Force Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which password attack takes advantage of a predefined list of words?

A

Dictionary attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What can be used to speed up the process of password guessing

A

Rainbow tables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is contained in a rainbow table

A

Hash / Passwords

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An email sent from unknown source disguised as a trusted source known to the message receiver is an example of: [2]

A
  • Spoofing

- Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What kind of general term is used to describe the process of securing a computer system?

A

Hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The intermediary systems used as a platform for a DDoS attack are often referred to as:

A

Zombies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A GROUP of intermediary systems used as a platform for a DDoS attack are often referred to as:

A

A botnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What defines a set of rules enforced in a network tha t the clients attempting to access the network must comply with?:

A

NAC ( Network Access Control)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When can NAC policies be enforced?

A

Before or after end-stations gain access to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define Pre-Admission NAC:

A

Where a host must, for example, be virus free or have patches applied before it can be allowed to connect to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Define Post-Admission NAC

A

Where a host is being granted/denied permissions based on its actions after it has been provided with the access to the network.