• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back

MAC Flooding

When the CAM table memory gets filled and causes a switch to enter fail open mode.

DNS Spoofing

Something

DNS Poisoning

the unauthorized modification of name resolution information

ARP Poisoning

spoofed frames of data added to an ARP table will contain false MAC addresses, ultimately sending false hardware address updates to a switch.

Fraggle attack

a type of DoS attack that sends large amounts of UDP traffic to ports 7 and 19.

Man in the Middle Attack

When malicious code is inserted into the network traffic.

TCP/IP hijacking

Intercepting packets on the network and modifying them without the need of a cookie

Spear Phishing

Obtaining information from a specific person

MAC Spoofing

a technique for changing the MAC address of a network adapter

PWN spoofing

type of spoof attack carried out on SANs

SYN attack

misuses the TCP three-way handshake process. The idea behind this is to overload servers and deny access to users.

Transitive Access

When one computer uses a second computer to attack a third, based on the trust of the second and third computers.

DDoS

When multiple computers attack a server to overload it

Teardrop DoS

attacks send many IP fragments with oversized payloads to a target.

IP Spoofing

when an attacker sends IP packets with a forged source IP address.

Replay attack

when valid data transmissions are maliciously repeated or delayed.

Open Relay

an invitation for attackers to send out spoofed e-mails and spam. These relays should be closed on SMTP servers so that only authenticated users can gain access to them.

Session hijacking

the exploitation of a computer session in an attempt to gain unauthorized access to data services or other resources on the computer.

Logic Bombs

code that has in some way been inserted into software, initiating malicious functions when specific criteria are met.

DoS attack

a single attack that attempts to stop a server from functioning.

Cross site scripting

An attack on a website that injects client-side script into Web pages

XML injection

A code injection that can compromise the logic of XML applications

LDAP injection

Used to modify LDAP statements and modify the LDAP tree

Buffer overflow

Initiated by sending random data to other services by using Javascript sometimes

XSRF

Cross site request forgery is an exploit of a website where unauthorized commands are issued from a trusted user