Shared Flashcard Set

Details

10c. Managing Common Security Threats
CompTIA Network+ Managing Common Security Threats
32
Computer Networking
Professional
04/04/2012

Additional Computer Networking Flashcards

 


 

Cards

Term
A ___ is a software program or code loaded onto a computer without the user’s knowledge.
Definition
virus
Term
A ___ automatically propagates without modifying software or alerting the user.
Definition
worm
Term
A ___ ___ appears as a helpful or harmless program but when installed delivers a malicious payload.
Definition
Trojan horse
Term
___ covertly gathers system information through the user’s Internet connection without his or her knowledge, usually for advertising purposes.
Definition
Spyware
Term
A ___ virus installs itself into the operating system and stays there. It typically loads with the operating system on boot.
Definition
resident
Term
A modification to an existing virus is called a ____ because it is a rereleased version of a known virus.
Definition
variant
Term
A ___ virus can change its characteristics to avoid detection.
Definition
polymorphic
Term
A ___ virus overwrites files or code with modified data.
Definition
overwriting
Term
A ___ virus amends an application by adding files or code.
Definition
nonoverwriting
Term
A ___ virus can hide itself to avoid detection.
Definition
stealth
Term
A ___ virus is designed to infect and corrupt documents.
Definition
macro
Term
To be considered a virus, malware must be able to ___ itself, requires a ___ program as a carrier, and must be activated or ___ in order to run.
Definition
replicate
host
executed
Term
A ___ ___ is different from a virus because it does not replicate itself and does not require a host program to run.
Definition
Trojan horse
Term
Although it can replicate, a ___ does not require a host or user intervention to propagate.
Definition
worm
Term
A ___ ___ ___ attack floods a network with more traffic than it can handle.
Definition
Denial of Service (DoS)
Term
In a ___ attack, spoofed UDP packets are sent to a network's broadcast address on specific ports to flood the network.
Definition
Fraggle
Term
In a ___ attack, a ping request is sent to a broadcast network address, with the sending address spoofed so that many ping replies overload the victim and prevent it from processing the replies.
Definition
Smurf
Term
In a ___ ___ ___ attack, an oversized ICMP datagram is used to crash IP devices that were manufactured before 1996.
Definition
ping of death
Term
In a ___ attack, the victim is overwhelmed with a flood of SYN packets.
Definition
SYN
Term
A ___ ___ is a type of denial of service attack that occurs when more data is put into a buffer than it can hold, thereby overflowing it.
Definition
buffer overflow
Term
An ___ -___ is a denial of service attack in which large numbers of ICMP messages are sent to a computer system to overwhelm it. The result is a failure of the TCP/IP protocol stack, which cannot tend to other TCP/IP requests.
Definition
ICMP flood
Term
A ___ attack is a brute force attack in which the attacker knows the username and guesses at the password.
Definition
password
Term
___ ___ is a hacker term for tricking people into revealing their password or some form of security information.
Definition
Social engineering
Term
Obtaining sensitive information by intercepting, listening to, and analyzing network communications is called ___.
Definition
eavesdropping
Term
In a ___ ___ attack, an attacker gains access to a computer or program by bypassing standard security mechanisms.
Definition
back door
Term
In a __-__-__-__ attack, the intruder places himself between the sending and receiving devices and captures the communication as it passes by.
Definition
man-in-the-middle
Term
When a man-in-the-middle attack is done with ftp (using the port command), it is known as a ___ ___ attack.
Definition
FTP bounce
Term
___ is a technique in which the real source of a transmission, file, or email is concealed or replaced with a fake source.
Definition
Spoofing
Term
In a ___ ___ ___ attack, a wireless access point is placed on a network without the administrator's knowledge.
Definition
rogue access point
Term
A ___ ___ attack is one in which a rogue wireless access point poses as a legitimate wireless service provider to intercept information users transmit.
Definition
evil twin
Term
Driving around with a laptop looking for open wireless access points or weak implementations that can be cracked is called ___ ___.
Definition
war driving
Term
Alerting others to open wireless systems by leaving a distinguishing mark is called ___ ___.
Definition
war chalking
Supporting users have an ad free experience!