Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
25 Cards in this Set
- Front
- Back
MAC Flooding |
When the CAM table memory gets filled and causes a switch to enter fail open mode. |
|
DNS Spoofing |
Something |
|
DNS Poisoning |
the unauthorized modification of name resolution information |
|
ARP Poisoning |
spoofed frames of data added to an ARP table will contain false MAC addresses, ultimately sending false hardware address updates to a switch. |
|
Fraggle attack |
a type of DoS attack that sends large amounts of UDP traffic to ports 7 and 19. |
|
Man in the Middle Attack |
When malicious code is inserted into the network traffic. |
|
TCP/IP hijacking |
Intercepting packets on the network and modifying them without the need of a cookie |
|
Spear Phishing |
Obtaining information from a specific person |
|
MAC Spoofing |
a technique for changing the MAC address of a network adapter |
|
PWN spoofing |
type of spoof attack carried out on SANs |
|
SYN attack |
misuses the TCP three-way handshake process. The idea behind this is to overload servers and deny access to users. |
|
Transitive Access |
When one computer uses a second computer to attack a third, based on the trust of the second and third computers. |
|
DDoS |
When multiple computers attack a server to overload it |
|
Teardrop DoS |
attacks send many IP fragments with oversized payloads to a target. |
|
IP Spoofing |
when an attacker sends IP packets with a forged source IP address. |
|
Replay attack |
when valid data transmissions are maliciously repeated or delayed. |
|
Open Relay |
an invitation for attackers to send out spoofed e-mails and spam. These relays should be closed on SMTP servers so that only authenticated users can gain access to them. |
|
Session hijacking |
the exploitation of a computer session in an attempt to gain unauthorized access to data services or other resources on the computer. |
|
Logic Bombs |
code that has in some way been inserted into software, initiating malicious functions when specific criteria are met. |
|
DoS attack |
a single attack that attempts to stop a server from functioning. |
|
Cross site scripting |
An attack on a website that injects client-side script into Web pages |
|
XML injection |
A code injection that can compromise the logic of XML applications |
|
LDAP injection |
Used to modify LDAP statements and modify the LDAP tree |
|
Buffer overflow |
Initiated by sending random data to other services by using Javascript sometimes |
|
XSRF |
Cross site request forgery is an exploit of a website where unauthorized commands are issued from a trusted user |