Home
Explore
Exams
Search for anything
Login
Get started
Home
IT SECURITY AND RISK MANAGMENT
IT SECURITY AND RISK MANAGMENT
0.0
(0)
Rate it
Studied by 0 people
View linked note
Learn
Practice Test
Spaced Repetition
Match
Flashcards
Card Sorting
1/18
There's no tags or description
Looks like no tags are added yet.
Study Analytics
All
Learn
Practice Test
Matching
Spaced Repetition
Name
Mastery
Learn
Test
Matching
Spaced
No study sessions yet.
19 Terms
View all (19)
Star these 19
1
New cards
What is a Man-in-the-Middle (MITM) attack?
An attack where the attacker intercepts and alters communication between two parties.
2
New cards
Define ARP Poisoning.
An attack that alters ARP tables to redirect traffic.
3
New cards
What is a Replay Attack?
An attack that copies and reuses legitimate transmissions to gain access.
4
New cards
What does DNS Poisoning do?
It redirects users to fraudulent websites.
5
New cards
What is a Denial-of-Service (DoS) attack?
An attack that overwhelms a server with excessive requests.
6
New cards
Define SYN Flood.
An attack that exploits the TCP handshake, leaving connections open.
7
New cards
What is Cross-Site Scripting (XSS)?
An attack that injects malicious scripts into web applications.
8
New cards
What is SQL Injection?
An attack that inserts harmful SQL statements to manipulate databases.
9
New cards
What function does a firewall serve?
It filters incoming and outgoing traffic based on security rules.
10
New cards
What is Unified Threat Management (UTM)?
It combines multiple security features such as firewall and antivirus.
11
New cards
What does a Demilitarized Zone (DMZ) do in a network?
It isolates public-facing services from the internal network.
12
New cards
What is the purpose of a Virtual Private Network (VPN)?
To encrypt data for secure remote access.
13
New cards
What is Session Hijacking?
An attack where the attacker takes over a user's session.
14
New cards
List one common type of DoS attack.
Smurf Attack, which spoofs IP addresses to flood the victim with responses.
15
New cards
What does Intrusion Detection & Prevention Systems (IDS/IPS) do?
It monitors and prevents malicious activities.
16
New cards
What is the role of Security Information and Event Management (SIEM)?
It aggregates and analyzes security data.
17
New cards
What does Network Address Translation (NAT) do?
It masks internal IP addresses.
18
New cards
What is Data Loss Prevention (DLP)?
Technology that monitors and prevents data leaks.
19
New cards
What is a Man-in-the-Browser (MITB) attack?
An attack where malware inside a browser modifies transactions.