Vol 2 Part 2: Security Services Flashcards
THIS is anything that can be considered a weakness that can compromise something else
A Vulnerability
THIS is a means of taking advantage of a vulnerability to compromise something else
An exploit
THIS is the actual potential to use an exploit IOT take advantage of a vulnerability
A threat
What do we call the measures we take in order to counteract threats?
Mitigation techniques
Spoofing attacks involve an attacker spoofing what two items in order to gain unauthorized access to something?
IP Addresses and MAC addresses
This attack refers to an attacker looking to leave server resources depleted and unavailable?
Denial of Service Attack
During a DOS attack, the attacker opens up the BLANK connection, and then uses a fake address so that the server continues to send a BLANK expecting a reply of a BLANK
- TCP Connection
- SYN,ACK
- ACK
An attacker can use a master computer and take control of other computers during a DOS attack, so that these other computers can take part in the DOS. What are these other computers referred to as, and what kind of attack is this known as?
bots, distributed denial of service (DDoS)
During a spoofing attack, the attacker uses a spoofed or “stolen” address. However, a reflection attack uses a BLANK instead of their own.
a legitimate host’s address
What kind of attack involves packets being sent to a server and then the server sending a reply to a different host, the target.
Reflection
An amplification attack differs from the reflection attack, because in an amplification attack, the attacker uses a protocol or service that does what with respect to the target host?
It sends a large volume of traffic
This kind of attack involves an attacker wedging themselves in between the communication path of two systems
Man in the middle
During a MitM attack, an attacker could be in between a host and a server without notice. What is this known as?
Eavesdropping
During a MitM attacker, the attacker will commonly reply as if it is the device the original host was trying to contact. The attacker sends an ARP reply last so that the ARP table on the source host points to the attacker’s computer. This kind of attack is known as what?
ARP table poisoning
What command is used during a reconnaissance attack in order to reveal the owner of the domain and IP address space?
nslookup
What two commands are used as a compliment during a reconnaissance attack in order to query DNS information to reveal domain owners, contact info, mail servers, and more?
whois and dig
This kind of attack involves sending a large amount of data to a device with the intent to fill up the memory and crashing the device?
Buffer overflow
Malicious software is also known as what?
Malware