• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/24

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

24 Cards in this Set

  • Front
  • Back

A hidden method used to gain access to a computer system, network, or application. Often used by software developers to ensure unrestricted access to the systems they create. Synonymous with trapdoor is called what?

Backdoor


A form of attack in which the attack needs to match not a specific item but just one of a set of items is called what?

Birthday attack

A term for a collection of software robots, or bots, that runs autonomously and automatically and commonly invisibly in the background. The term is most often associated with malicious software, but it can also refer to the network of computers using distributed computing software is called what?

botnet

A specific type of software coding error that enables user input to overflow the allocated storage area and corrupt a running program is called what?

buffer overflow

An attack in which actions are taken to deprive authorized individuals from accessing a system, its resources, the data it stores or processes, or the network to which it is connected is called what?

denial-of-service (DoS) attack

A special type of DoS attack in which the attacker elicits the generally unwilling support of other systems to launch a many-against-one attack is called what?

distributed denial-of-service (DoS) attack

The use of a DNS record during the payment grace period without paying is called what?

DNS kiting

The service that translates an Internet domain name (such as www.mcgraw-hill.com) into IP addresses is called what?

DNS(Domain Name Service)

An attack on an innocent victim machine where content is downloaded without the user's knowledge is called what?

drive-by download attack

A class of software that is designed to cause harm is called what?

malware

Any attack that attempts to use a network node as the intermediary between two other nodes. Each of the endpoint nodes thinks it is talking directly to the other, but each is actually talking to the intermediary is called what?

man-in-the-middle attack

The way in which Microsoft Windows represents an unauthenticated connection is called what?

null session

The use of a fake web site to socially engineer someone out of credentials is called what?

pharming

The use of social engineering to trick a user into responding to something such as an e-mail to instantiate a malware-based attack is called what?

phishing

The use of a series of ICMP ping messages to map out a network is called what?

ping sweep

The examination of TCP and UDP ports to determine which are open and what services are running is called what?

port scan

An attack where data is replayed through a system to reproduce a series of transactions is called what?

replay attack

A number within a TCP packet to maintain TCP connections and conversation integrity is called what?

sequence number

An method of generating significant numbers of packets for a DoS attack is called what?

smurf attack

A software or hardware device used to observe network traffic as it passes through a network on a shared broadcast media is called what?

sniffer

A form of targeted phishing where specific information is included to convince the recipient that the communication is genuine is called what?

spear phishing

Making data appear to have originated from another source so as to hide the true origin from the recipient is called what?

spoofing

A method of performing DoS by exhausting TCP connection resources through partially opening connections and letting them time-out is called what?

SYN flood

A machine that is at least partially under the control of a botnet is called what?

zombie