Unit 3 - Module 3 Flashcards

1
Q

```

What’s the difference between DDoS and DoS?

A

A denial-of-service (DoS) attack floods a server with traffic, making a website or resource unavailable, with just one machine. A distributed denial-of-service (DDoS) attack is a DoS attack that uses multiple computers or machines to flood a targeted resource.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is TCP? (Transmisson Control Protocol)

A

A communication standard that **enables ** application program and computing devices to exchange messages over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What do you call the DoS attack that simulates a TCP connection and floods a server with SYN packets?

A

A SYN ( Synchronzie ) Flood Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What protocol informs data transmissions across the network?

A

Internet Control Message Protocol (ICMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What do you call the DoS attack that sends ICMP packets repeatedly to a network server?

A

Internet Control Message Protocol (ICMP) Flood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What do you call the type of DoS attack that a hacker pings a system by sending it oversized ICMP packets that are bigger than 64KB?

A

Ping of Death

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a network protocol analyzer also known as?

A

A Packet Sniffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a tcpdump and what does it display?

A

A tcpdump is a command-line network protocol analyzer. ( Think of a commandline like using “run” on windows)

It displays timestamp, IP address, destination IP addresses, and port numbers ( source and destination ) being used in the communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is passive packet sniffing?

A

A type of attack where data packets are in transit

ie) Think of the mailman reading someones mail before handing it off.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is active packet sniffing?

A

A type of attack where data packets are manipulated in transit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are 2 ways to prevent packet sniffing from threat actors?

A

Using a VPN and making sure your website is using HTTPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the 3 common IP spoofing attacks?

A

On-Path attack
Replay Attack
Smurf Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is an on-path attack?

A

Where malicious actor places themselves in the middle of an authorized connection and intercepts or alters the data in transit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a replay attack?

A

A network attack performed when a malicious actor intercepts a data packet in transit and delays it or reapets it at another time.

This can cause connection issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a smurf attack?

A

A network attack performed when an attacker sniffs an authorized user’s IP address and floods it with packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What do you call the process of strengthening a system to reduce it’s vulnerability and attack surface area?

A

Security hardening

17
Q

What do you call potential vulnerabilities that a threat actor could exploit?

A

Attack Surface

18
Q

What are 5 things Security Hardening looks at?

A

Hardware
Operating Systems
Applications
Computer Networks
Databases

19
Q

What do you call a simulated attack that help identify vulnerabilities in systems, networks, websites, applications, and processes.

A

Penetration Test

20
Q

What do you call the interface between compter hardware and the user?

A

Operating System (OS)

21
Q

What do you call a software and operating system update that addresses security vulnerabilities within a program or product?

A

Patch Update

22
Q

What is a security measure which requires a user to verify their identity in two or more ways to access a system or network?

A

Muti-factor authentication (MFA)

23
Q

What is a Baseline Configuration? (Baseline image)

A

A documented set of specifications with a system that is used as a basis for future builds, realeases, and updates.

24
Q

What is a trail-and-error process of discovering private information?

A

Brute Force Attack

25
Q

What are 2 kinds of a Brute Force Attacks?

A

Simple Brute Force Attack - Guessing a user’s login credentials.

Dictionary Attacks - Using commonly used passwords and stolen credentials from previous breaches.

26
Q

What are software versions of physical computers?

A

Virtual Machines (VMs)

27
Q

What do you call a testing enviroment that allows you to execute software of programs separate from your network?

A

A Sandbox Environment

28
Q

What do you call encrypting original text making it impossible for a threat actor can packet sniff data?

A

Salting and Hashing

29
Q

What are 4 prevention measure used to protect from brute force attacks?

A

Salting and Hashing
Multi-factor authentication (MFA) and two factor authentication (2FA)
CAPTCHA and reCAPTCHA
Password policies

30
Q

What’s the difference between MFA and 2FA?

A

2FA only needs 2 forms of verification.
While MFA uses more.

31
Q

What are 3 network security hardening tasks?

A

Port Filtering
Network access privilege
Encryption

32
Q

What do you call an application that monitors system activity, data packet sniffs and alerts on possible intrustions?

A

An Intrustion Detection System ( IDS )

33
Q

What do you call an application that monitors system activity and stop possible intrusions?

A

Intrusion Prevention System (IPS)

34
Q

What do you call on-demand network access to a share pool of configurable comptung resourses?

A

Cloud Computing

35
Q

What is the processes and technologies that helps organizations manage digital identities in their enviroment?

A

Identity Access Management (IAM)

36
Q

What is a zero day attack?

A

An exploit that was previously unknown

Bascially, a organization goes under attack and how the attack happens has never been seen before. Therefore the engineers have zero days worked on a patch for this attack.

37
Q

What is the shared responsibility model in regards to CSP’s?

A

Where CSP’s are responsible for cloud infrastructure, including physical data center, hypervisors, and host operating system.

While the company is responsible for the assests and processes that they store or operate in the cloud.