CompTIA Security+ Section 18

0.0(0)
studied byStudied by 0 people
full-widthCall with Kai
GameKnowt Play
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/22

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

23 Terms

1
New cards

What is a DDoS attack?

Overwhelms a system with traffic from many devices.

2
New cards

What is a flood attack?

Overloads a system with excessive traffic or requests.

3
New cards

What is a permanent denial of service (PDoS)?

Damages hardware or firmware to make a system unusable.

4
New cards

What is a DNS amplification attack?

Uses open DNS servers to flood a victim with traffic.

5
New cards

What is a fork bomb?

Creates endless processes to crash a system.

6
New cards

What is DNS?

System that translates domain names to IP addresses.

7
New cards

What is DNS cache poisoning?

Corrupts DNS entries to redirect users to malicious sites.

8
New cards

What is DNS tunneling?

Uses DNS queries to sneak data or commands through.

9
New cards

What is domain hijacking?

Taking control of a registered domain without authorization.

10
New cards

What is a DNS zone transfer attack?

Tricking a DNS server into sharing its entire database.

11
New cards

What is a directory traversal attack?

Accessing files outside the intended directory.

12
New cards

What is file inclusion?

Loading malicious files into an application.

13
New cards

What is arbitrary code execution?

Running attacker’s code on a victim system.

14
New cards

What is a replay attack?

Reusing captured data packets to impersonate a user.

15
New cards

What is session management?

Controls user logins and active sessions.

16
New cards

What is session hijacking?

Attacker steals a valid session ID to impersonate a user.

17
New cards

What is cookie poisoning?

Changing cookies to gain unauthorized access.

18
New cards

What is an on-path attack?

Attacker intercepts and alters traffic between systems.

19
New cards

What is SSL stripping?

Forcing encrypted HTTPS traffic down to HTTP.

20
New cards

What is a downgrade attack?

Forcing systems to use weaker security protocols.

21
New cards

What is LDAP?

Protocol for accessing and managing directory services.

22
New cards

What is command injection?

Attacker runs malicious commands on a system.

23
New cards

What are indicators of compromise (IoCs)?

Signs that a system has been breached.