Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
20 Cards in this Set
- Front
- Back
Refer to the following kinds of attacks. Which one is an example of TCP/IP hijacking?
|
Man-in-the-middle
|
|
As an experienced network administrator, you have to make sure the security of the Infotec network. Refer to the following malicious software. Which one will most probably open a backdoor on a system?
|
Trojan
|
|
Which one of the following options is an attack launched from multiple zombie machines in attempt to bring down a service?
|
DDoS
|
|
Which of the following types of attacks is BEST described as an attacker capturing part of a communication and later sending that communication segment to the server while pretending to be the client?
|
Replay
|
|
A denial-of-service attack (DoS attack) or distributed denial-of-service attack (DDoS attack) is an attempt to make a computer resource unavailable to its intended users. Which method can be used to perform denial of service (DoS) attacks?
|
Botnet
|
|
Which of the following definitions would be correct regarding Eavesdropping?
|
Listening or overhearing parts of a conversation.
|
|
Which of the following attacks are being referred to if the attack involves the attacker gaining access to a host in the network and logically disconnecting it?
|
TCP/IP Hijacking
|
|
Which of the following attacks are being referred to if packets are not connection-oriented and do not require the synchronization process?
|
UDP attack
|
|
From the listing of attacks, choose the attack which exploits session initiation between a Transport Control Program (TCP) client and server within a network?
|
SYN attack
|
|
One of the below options is correct regarding the DDoS (Distributed Denial of Service) attack?
|
Use of multiple computers to attack a single organization.
|
|
Which of the following type of attacks would allow an attacker to capture HTTP requests and send back a spoofed page?
|
TCP/IP hijacking
|
|
The CEO of your company is worrying about staff browsing inappropriate material on the Internet via HTTPS. Your company is advised to purchase a product which can decrypt the SSL session, scan the content and then repackage the SSL session without staff knowing. Which type of attack is similar to this product?
|
Man in the middle
|
|
Refer to the following security threats. Which one will hide its processes as well as files so that they will not be easily detected?
|
Rootkit
|
|
Which item can be commonly programmed into an application for ease of administration?
|
Backdoor
|
|
Study the following items carefully, which one will permit a user to float a domain registration for a maximum of five days?
|
kitnig
|
|
One type of network attack sends two different messages that use the same hash function to generate the same message digest. Which network attack does this?
|
Birthday attack
|
|
Refer to the following malicious software. Which one will infect a host computer as well as collect various types of personal information, such as Internet surfing habits and sites that have been visited?
|
Spyware
|
|
Which of the following access attacks would involve looking through your files in the hopes of finding something interesting?
|
snooping
|
|
From the listing of attacks, choose the attack which misuses the TCP (Transmission Control Protocol) three-way handshake process, in an attempt to overload network servers, so that authorized users are denied access to network resources?
|
SYN (Synchronize) attack
|
|
Which of the following common attacks would the attacker capture the user’s login information and replay it again later?
|
reply attack
|