Chapter 14 - Supplement - Sheet1 Flashcards

1
Q

DoS

A

Denial of Service attack. Prevents access to network resources.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Varieties of DoS

A

Ping of Death, Smurf, SYN Flood, Tribe Flood Network, Tribe Flood Network 2000, Stacheldragt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Ping of Death

A

Type of DoS. One Ping request sends a huge amount of data instead of the small payload PING normally carries. Most modern OSes prevent this from working.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Smurf

A

Type of DoS. Attacker spoofs the source IP of a PING request. Sends PING request to all broadcast addresses. Router forwards reuqests to all hosts on the subnet. Response pings are sent back to victim.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SYN Flood

A

Type of DoS. Sending a TCP/IP packet with SYN flag set to 1 causes server to open a connection and respond with SYN/ACK, waiting for an ACK. Attacker doesn’t send ACK, forcing the server to keep the connection open, using a portion of memory. Server isn’t able to respond to legitimate requests.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Tribe Flood Network

A

Type of DoS. TFN. DDoS (Distributed Denial of Service) attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Tribe Flood Network 2000

A

Type of DoS. TFN2K. DDoS (Distributed Denial of Service) attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Stacheldraght

A

Type of DoS. Means barbed wire in German. Mix of techniques involving TFN and encryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Types of Viruses

A

Macro Virus, Boot-Sector Virus, Multipartite Viruses File Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

File Virus

A

Replaces some of all of a target program’s code with their own. The compromised file, when executed, does the damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Macro Virus

A

Script of commands written in software that supports macros (EG MS Office). Annoying but harmless.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Boot-Sector Virus

A

Infect the hard drive’s boot sector, pointing the PC in the wrong direction or removing reference to the OS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Multipartite Virus

A

Affects the boot sector and the hard drive’s files at once.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Worms

A

Like viruses, but can replicate without users opening an infected file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Buffer Overflow

A

Injecing so much data into the forms of an application that the host crashes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

War Driving

A

Driving around using high powered anttenaes to try to break into wireless networks.

17
Q

War Chalking

A

The collection of information regarding wireless networks either in chalk on the sitewalk or online

18
Q

3 ways to detect and defend against an intruder

A

Active Detection, Passive Detection, Proactive Defense Methods

19
Q

Active Detection

A

Actively deteting common hacking methods, scanning for suspicious activity, etc

20
Q

Passive Detection

A

Logging activity to be later reviewed if a threat is identified by another detection technique

21
Q

Proactive Defense Methods

A

Proactively searching for holes in your own security

22
Q

The Ping of Death and SYN floods are examples of what types of attack?

A

DoS

23
Q

How often should you update your virus definitions in your antivirus software?

A

Once a week

24
Q

What type of attack injects a command that overflows the amount of memory allocated
and executes commands that would not normally be allowed?

A

Buffer Overflow

25
Q

What type of virus attacks executable programs?

A

A File Virus

26
Q

What kind of tool could a hacker use to intercept traffic on your network?

A

Packet Sniffer

27
Q

What type of virus uses Microsoft’s Visual Basic scripting language?

A

A Macro Virus

28
Q

What is it called when someone intercepts traffic on your network that’s intended for a
different destination computer?

A

Man-in-the-middle attack

29
Q

If someone installed a wireless router on your network without your knowledge, that
would be called ___________________.

A

A rogue access point

30
Q

What software application can help automatically ensure that your Windows-based
computers have the most current security patches?

A

Windows Update

31
Q

The two different types of virus scans are ___________________.

A

On-demand and on-access virus scans