1.4 Analyze potential indicators associated with network attacks Flashcards

1
Q

Used to detect the presence of a wireless network.

A

Wireless scanner/cracker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An attack in which a hacker operates a false access point that will automatically clone, or twin, the identity of an access point based on a client device’s request to connect.

A

Evil twin attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

May be planted by an employee for convenience, or it may be operated externally by an attacker.

A

Rogue access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The unauthorized accessing of data via a Bluetooth connection.

A

Bluesnarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Grants an attacker remote control over the hardware and software of your devices over a Bluetooth connection.

A

Bluebugging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The sending of unsolicited messages to Bluetooth capable devices without the permission of the owner/user.

A

Bluejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Eavesdropping or packet capturing Bluetooth communications.

A

Bluesniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A DoS attack against a Bluetooth device.

A

Bluesmacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A type of wireless management frame that can be used in wireless attacks, including discovering hidden SSIDs, causing a DoS, hijacking sessions, and on-path.

A

Disassociation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The transmission of radio signals to prevent reliable communications by decreasing the effective signal-to-noise ratio.

A

Jamming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A tracking technology based on the ability to power a radio transmitter using current generated in an antenna when placed in a magnetic field.

A

Radio frequency identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A standard to establish radio communications between devices in close proximity. It is commonly employed for contactless payments.

A

Near field communication (NFC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A mathematical and cryptographic term for a random number.

A

Initialization vector (IV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A communications eavesdropping attack. Attackers position themselves in the communication stream between a client and server.

A

On-path attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When the malware is operating on the victim’s system.

A

Browser on-path attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A form of attack in which malicious content is submitted to a vulnerable application, typically a web browser or web server, under the guise of a valid HTML/HTTP header value.
(

A

HTTP Header manipulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The act of falsifying the IP-to-MAC address resolution system employed by TCP/IP.

A

ARP poisoning

18
Q

Uses a flooding attack to compromise a switch so that the switch gets stuck into flooding all network communications.

A

MAC flooding

19
Q

Used to impersonate another system, often a valid or authorized network device to bypass port security or MAC filtering limitation.

A

MAC cloning/spoofing

20
Q

The falsification of the source address of network packets. As a result, victims are unable to locate the true attackers or initiators of a communication. Also, the attacker may use this against the source address to redirect packet responses, replies, and echoes to some other system.

A

IP spoofing

21
Q

the hierarchical naming scheme used in both public and private networks. This links human-friendly fully qualified domain names (FQDNs) and IP addresses together.

A

Domain name system (DNS)

22
Q

The malicious action of changing the registration of a domain name without the authorization of the valid owner.

A

Domain hijacking

23
Q

The act of falsifying the DNS information used by a client to reach a desired system.

A

DNS poisoning

24
Q

Is a means to make a web page available through multiple URL addresses or domain names a.k.a. URL forwarding.

A

URL redirection

25
Q

A scoring system that can be used to determine whether your communications or your site is more likely legitimate or more likely malicious or fraudulent. Sometimes this is called a sender score, especially when it is focusing on email.

A

Domain reputation

26
Q

A form of attack that has the primary goal of preventing the victimized system from performing legitimate activity or responding to legitimate traffic.

A

Denial of service (DoS)

27
Q

Attacks are waged by first compromising or infiltrating one or more intermediary systems (i.e., bots) that serve as a launch points or attack platforms.

A

Distributed denial of service (DDoS)

28
Q

Employs an amplification or bounce network that is an unwilling or unknowing participant that is unfortunately able to receive broadcast messages and create message responses, echoes , or bounces.

A

Distributed reflective denial-of-service (DRDoS)

29
Q

This DRDoS attack uses ICMP echo reply packets (ping packets).

A

Smurf attack

30
Q

This DRDoS uses UDP packets.

A

Fraggle attack

31
Q

This DoS attack exploits the TCP three way handshake and results in resource exhaustion.

A

SYN flood

32
Q

The attacker sends fragments to a victim that when re-assembled result in an oversized ping packet causing a buffer overflow.

A

Ping of death

33
Q

Uses the Xmas scan to perform a DoS.

A

Xmas attack

34
Q

A partial transmission of fragmented packets causing the target to consume system resources holding onto incomplete reassembles.

A

Teardrop attack

35
Q

A SYN flood attack where the source and destination address are both said to be victims address, which causes a logical error.

A

Land attack

36
Q

An attack where the amount of work or traffic generated by an attacker is multiplied to DoS the victim.

A

Amplification attacks

37
Q

Administrators need to analyze and the site for the potential indicators that are associated with Netwerk attacks that may have been caused by malicious code or malicious script execution.

A

Malicious code or script execution

38
Q

Both a scripting language as well as a commandline shell for Microsoft Windows. PowerShell can be used to write malicious scripts.

A

Powershell

39
Q

A scripting programming language that is popular. Python can be used to write malicious scripts.

A

Python

40
Q

A command shell and a scripting language. Bash can be used to write malicious scripts.

A

Bash

41
Q

A program or script written in a language that is embedded into specific files. These can be a powerful tool for automating tasks, but they can also be employed for malicious purposes.

A

Macros

42
Q

A powerful programming language that is built into productivity documents. It is the primary language that Office macros are written in.

A

Visual Basic for Applications