• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off

Card Range To Study



Play button


Play button




Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

20 Cards in this Set

  • Front
  • Back
Refer to the following kinds of attacks. Which one is an example of TCP/IP hijacking?
As an experienced network administrator, you have to make sure the security of the Infotec network. Refer to the following malicious software. Which one will most probably open a backdoor on a system?
Which one of the following options is an attack launched from multiple zombie machines in attempt to bring down a service?
Which of the following types of attacks is BEST described as an attacker capturing part of a communication and later sending that communication segment to the server while pretending to be the client?
A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Which method can be used to perform denial of service (DoS) attacks?
Which of the following definitions would be correct regarding Eavesdropping?
Listening or overhearing parts of a conversation.
Which of the following attacks are being referred to if the attack involves the attacker gaining access to a host in the network and logically disconnecting it?
TCP/IP Hijacking
Which of the following attacks are being referred to if packets are not connection-oriented and do not require the synchronization process?
UDP attack
From the listing of attacks, choose the attack which exploits session initiation between a Transport Control Program (TCP) client and server within a network?
SYN attack
One of the below options is correct regarding the DDoS (Distributed Denial of Service) attack?
Use of multiple computers to attack a single organization.
Which of the following type of attacks would allow an attacker to capture HTTP requests and send back a spoofed page?
TCP/IP hijacking
The CEO of your company is worrying about staff browsing inappropriate material on the Internet via HTTPS. Your company is advised to purchase a product which can decrypt the SSL session, scan the content and then repackage the SSL session without staff knowing. Which type of attack is similar to this product?
Man in the middle
Refer to the following security threats. Which one will hide its processes as well as files so that they will not be easily detected?
Which item can be commonly programmed into an application for ease of administration?
Study the following items carefully, which one will permit a user to float a domain registration for a maximum of five days?
One type of network attack sends two different messages that use the same hash function to generate the same message digest. Which network attack does this?
Birthday attack
Refer to the following malicious software. Which one will infect a host computer as well as collect various types of personal information, such as Internet surfing habits and sites that have been visited?
Which of the following access attacks would involve looking through your files in the hopes of finding something interesting?
From the listing of attacks, choose the attack which misuses the TCP (Transmission Control Protocol) three-way handshake process, in an attempt to overload network servers, so that authorized users are denied access to network resources?
SYN (Synchronize) attack
Which of the following common attacks would the attacker capture the user’s login information and replay it again later?
reply attack