1.4 Analyze potential indicators associated with network attacks Flashcards
Wireless
-Evil twin
Wireless
-Rogue access point
Wireless
-Bluesnarfing
Wireless
-Bluejacking
Wireless
-Disassociation
Wireless
-Jamming
Wireless
-Radio frequency identification (RFID)
Wireless
-Near-field communication (NFC)
Wireless
-Initialization vector (IV)
On-path attack (man-in-the-middle/man-in-the-browser attack)
Layer 2 attacks
-Address Resolution Protocol (ARP) poisoning
Layer 2 attacks
-Media access control (MAC) flooding
Layer 2 attacks
-MAC cloning
Domain name system (DNS)
-Domain Hijacking
Domain name system (DNS)
-Domain poisoning
Domain name system (DNS)
-Uniform Resource Locator (URL) redirection
Domain name system (DNS)
-Domain reputation
Distributed denial-of-service (DDoS)
-Network
Distributed denial-of-service (DDoS)
-Application
Distributed denial-of-service (DDoS)
-Operational technology (OT)
Malicious code or script execution
-Powershell
Malicious code or script execution
-Python
Malicious code or script execution
-Bash
Malicious code or script execution
-Macros