Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
17 Cards in this Set
- Front
- Back
A malicious proxy could create a(n) _______________ attack. |
Man-in-the-middle |
|
Changing a source IP address for malicious purpose is an example of _______________. |
Spoofing |
|
Abusing the TCP handshake in an effort to overuse server resources can be done using a(n) _______________.
|
SYN Flood |
|
The main TCP/IP defense against a man-in-the-middle attack is the use of a(n) _______________. |
Sequence number |
|
A(n) _______________ is a way back into a machine via an unauthorized channel of access. |
Backdoor |
|
A NIC can be set in promiscuous mode to enable _______________. |
Sniffing |
|
When a keylogger is installed as malware, it is referred to as _______________. |
Spyware |
|
Rendering a resource useless is called a(n) _______________. |
Denial of Service(DoS) attack |
|
An attack designed to match any user's password as opposed to a specific user's password is an example of a(n) _______________. |
Birthday attack |
|
Holding a DNS name without paying is called _______________. |
DNS kiting |
|
The first step in an attack on a computer system consists of: |
Obtaining as much information about the organization in which the target lies as possible |
|
An attack in which the attacker simply listens for all traffic being transmitted across a network, in the hope of viewing something such as a user ID and password combination, is known as: |
A Sniffing attack |
|
A SYN flood is an example of what type of attack? |
Denial-of-service |
|
Which attack takes advantage of a trusted relationship that exists between two systems? |
Spoofing |
|
Rootkits are challenging security problems because: |
A) Their true functionality can be cloaked, preventing analysis |
|
The trick in TCP/IP hijacking is in trying to: |
Maintain the correct sequence numbers for the response packets |
|
In what type of attack does an attacker resend the series of commands and codes used in a financial transaction to cause the transaction to be conducted multiple times? |
Replay |