• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/17

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

17 Cards in this Set

  • Front
  • Back

A malicious proxy could create a(n) _______________ attack.

Man-in-the-middle

Changing a source IP address for malicious purpose is an example of _______________.

Spoofing

Abusing the TCP handshake in an effort to overuse server resources can be done using a(n) _______________.


SYN Flood

The main TCP/IP defense against a man-in-the-middle attack is the use of a(n) _______________.

Sequence number

A(n) _______________ is a way back into a machine via an unauthorized channel of access.

Backdoor

A NIC can be set in promiscuous mode to enable _______________.

Sniffing

When a keylogger is installed as malware, it is referred to as _______________.

Spyware

Rendering a resource useless is called a(n) _______________.

Denial of Service(DoS) attack

An attack designed to match any user's password as opposed to a specific user's password is an example of a(n) _______________.

Birthday attack

Holding a DNS name without paying is called _______________.

DNS kiting

The first step in an attack on a computer system consists of:

Obtaining as much information about the organization in which the target lies as possible

An attack in which the attacker simply listens for all traffic being transmitted across a network, in the hope of viewing something such as a user ID and password combination, is known as:

A Sniffing attack

A SYN flood is an example of what type of attack?

Denial-of-service

Which attack takes advantage of a trusted relationship that exists between two systems?

Spoofing

Rootkits are challenging security problems because:

A) Their true functionality can be cloaked, preventing analysis
B) They can be invisible to the operating system and end user
D) They can do virtually anything an operating system can do

The trick in TCP/IP hijacking is in trying to:

Maintain the correct sequence numbers for the response packets

In what type of attack does an attacker resend the series of commands and codes used in a financial transaction to cause the transaction to be conducted multiple times?

Replay