1.4 Flashcards

1
Q

Rogue Access Point (rogue AP)

A

an AP placed within a network w/o official authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Evil Twin

A

a rouge access point w/the same SSID (service set identifier) or similar as a legitimate access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bluesnarfing

A

unauthorized access to, or theft of info from a Bluetooth device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bluejacking

A

practice of sending unsolicited messages to nearby Bluetooth devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Disassociation Attack

A

effectively removes a wireless client from a wireless network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Jamming

A

usually prevents all users from connecting to a wireless network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Radio-Frequency Identification (RFID) Systems

A

used to track and manage inventory and any type of valuable assets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Near Field Communication (NFC)

A

a way for mobile devices to communicate w/one another when close

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Initialization Vector (IV)

A

the attacker uses packet injection techniques to add additional packets into the data stream

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

On Path/Man-In-The-Middle Attack

A

attacker uses a separate computer that accepts traffic from each party in a conversation and forwards the traffic between the two

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ARP (address resolution protocol) Poisoning

A

an attack that misleads computers or switches about the actual MAC (media access control) address of a system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

MAC (media access control) Flooding

A

an attack against a switch that attempts overload it w/different MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MAC (media access control) Cloning

A

changing a system’s MAC (media access control) address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Domain Hijacking

A

an attacker changes a domain name registration w/o permission from a owner

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Domain Name System (DNS poisoning)

A

attack attempt’s to modify or corrupt DNS (domain name system) data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Uniform Resource Locator (URL) redirection

A

redirect traffic to different page within a site or even a different site completely

17
Q

Domain Reputation

A

helps ISP ( internet service provider) determine the likelihood that an email is being sent by a legitimate organization or its a malicious email

18
Q

Distributed Denial of Service (DDoS)

A

attack from one or two more computers against a single target

19
Q

Network DDoS (distributed denial of service) attack

A

sustained, abnormally high amount of network traffic on. the NIC(network interface card) of the attacked computer

20
Q

Application DDoS attack

A

web servers run web apps and a DDoS then overloads web apps

21
Q

Operational technology (OT)

A

methods used to monitor and manage industrial control systems and manufacturing equipment

22
Q

Powershell

A

a task based command line shell and scripting language that allows you to enter commands directly

23
Q

Python

A

an intercepted programming language that includes extensive libraries which simplifies many programming tasks

24
Q

Bash

A

command language interpreter for Unix and Unix-like operating systems

25
Q

Macros

A

short intruction that will run a longer set of instructions