1.4 Given a scenario, analyze potential indicators associated with network attacks Flashcards
What is Wireless?
Wireless refers to the transmission of data over radio waves without the need for physical cables or connections.
What term describes the transmission of data over radio waves without physical connections?
Wireless
What is an Evil twin?
An Evil twin is a rogue wireless access point that masquerades as a legitimate Wi-Fi network to intercept data or deceive users.
What term describes a rogue wireless access point that impersonates a legitimate network?
Evil twin
What is a Rogue access point?
A Rogue access point is an unauthorized wireless access point that has been installed on a network without explicit authorization from the network administrator.
What term describes an unauthorized wireless access point installed without authorization?
Rogue access point
What is Bluesnarfing?
Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection, often without the user’s knowledge or consent.
What term describes the unauthorized access of information from a wireless device through Bluetooth?
Bluesnarfing
What is Bluejacking?
Bluejacking is the unauthorized sending of unsolicited messages or spam to Bluetooth-enabled devices, often for the purpose of advertising or harassment.
What term describes the unauthorized sending of unsolicited messages to Bluetooth-enabled devices?
Bluejacking
What is Disassociation?
Disassociation is the deliberate termination of a Wi-Fi connection between a wireless device and an access point, often used as a method of attack to disrupt connectivity.
What term describes the deliberate termination of a Wi-Fi connection between a device and an access point?
Disassociation
What is Jamming?
Jamming is the interference with wireless signals, typically through the transmission of noise or radio frequency interference, to disrupt communication or block signals.
What term describes the interference with wireless signals to disrupt communication or block signals?
Jamming
What is Radio frequency identification (RFID)?
Radio frequency identification (RFID) is a technology that uses radio waves to identify and track objects, often used in inventory management, access control, or payment systems.
What term describes the technology that uses radio waves to identify and track objects?
Radio frequency identification (RFID)
What is Nearfield communication (NFC)?
Nearfield communication (NFC) is a short-range wireless technology that allows for contactless communication between devices, commonly used in mobile payment systems and access control.
What term describes the short-range wireless technology that allows for contactless communication between devices?
Nearfield communication (NFC)
What is an Initialization vector (IV)?
An Initialization vector (IV) is a random or semi-random value used in encryption algorithms to ensure unique ciphertexts, preventing patterns or repetition in encrypted data.
What term describes a value used in encryption algorithms to ensure unique ciphertexts?
Initialization vector (IV)
What is an On-path attack?
An On-path attack, previously known as a man-in-the-middle attack or man-in-the-browser attack, is a type of cyber attack where the attacker intercepts and manipulates communication between two parties without their knowledge.
What term describes a cyber attack where the attacker intercepts and manipulates communication between two parties without their knowledge?
On-path attack (previously known as man-in-the-middle attack/ man-in-the-browser attack)
What are Layer 2 attacks?
Layer 2 attacks are network attacks that target the data link layer of the OSI model, exploiting vulnerabilities in protocols such as Ethernet or Wi-Fi to intercept, manipulate, or disrupt network traffic.
What term describes network attacks targeting the data link layer of the OSI model?
Layer 2 attacks
What is Address Resolution Protocol (ARP) poisoning?
Address Resolution Protocol (ARP) poisoning is a network attack where the attacker sends falsified ARP messages to associate the attacker’s MAC address with the IP address of another network device, redirecting traffic or facilitating eavesdropping.
What term describes a network attack where falsified ARP messages are used to associate the attacker’s MAC address with the IP address of another device?
Address Resolution Protocol (ARP) poisoning
What is MAC flooding?
MAC flooding is a network attack where the attacker floods the switch’s MAC address table with fake MAC addresses, causing the switch to enter into fail-open mode and forward traffic to all ports, facilitating eavesdropping or network disruption.
What term describes a network attack where the switch’s MAC address table is flooded with fake MAC addresses?
Media access control (MAC) flooding
What is MAC cloning?
MAC cloning is the process of mimicking or spoofing the MAC address of another device, often used to bypass network access controls or impersonate legitimate devices.
What term describes the process of mimicking the MAC address of another device?
MAC cloning
What is the Domain name system (DNS)?
The Domain Name System (DNS) is a hierarchical decentralized naming system for computers, services, or any resource connected to the Internet or a private network, translating domain names into IP addresses.
What term describes the hierarchical decentralized naming system for computers connected to the Internet?
Domain name system (DNS)
What is Domain hijacking?
Domain hijacking is the unauthorized transfer of a domain name registration to another person or entity without the domain owner’s consent, often resulting in loss of control over the domain.
What term describes the unauthorized transfer of a domain name registration?
Domain hijacking
What is DNS poisoning?
DNS poisoning is a type of cyber attack where the attacker corrupts or falsifies DNS data to redirect DNS queries to malicious websites, intercept communications, or perform phishing attacks.
What term describes the corruption or falsification of DNS data to redirect DNS queries?
DNS poisoning
What is URL redirection?
URL redirection is a technique used to redirect website visitors from one URL to another, often used for legitimate purposes such as website maintenance or updating links.
What term describes the technique used to redirect website visitors from one URL to another?
URL redirection
What is Distributed denial-of-service (DDoS): Network?
Distributed denial-of-service (DDoS): Network attacks flood a network with excessive traffic, overwhelming its capacity and causing disruption or downtime.
What term describes attacks that flood a network with excessive traffic, causing disruption or downtime?
Distributed denial-of-service (DDoS): Network
What is Distributed denial-of-service (DDoS): Application?
Distributed denial-of-service (DDoS): Application attacks target specific applications or services, overwhelming them with malicious traffic and causing service disruption.
What term describes attacks that target specific applications or services, causing service disruption?
Distributed denial-of-service (DDoS): Application
What is Distributed denial-of-service (DDoS): Operational technology (OT)?
Distributed denial-of-service (DDoS): Operational technology (OT) attacks target industrial control systems, disrupting critical infrastructure and operations.
What term describes attacks that target industrial control systems, disrupting critical infrastructure and operations?
Distributed denial-of-service (DDoS): Operational technology (OT)
What is Malicious code or script execution?
Malicious code or script execution refers to the running of unauthorized code or scripts on a system, often with the intent of compromising security, stealing data, or causing damage.
What term describes the running of unauthorized code or scripts on a system?
Malicious code or script execution
What is PowerShell?
PowerShell is a command-line shell and scripting language developed by Microsoft, often used for task automation and configuration management in Windows environments.
What term describes the command-line shell and scripting language developed by Microsoft?
PowerShell
What is Python?
Python is a high-level programming language known for its simplicity and versatility, commonly used for web development, data analysis, and automation tasks.
What term describes the high-level programming language known for its simplicity and versatility?
Python
What is Bash?
Bash, short for Bourne Again Shell, is a command-line shell and scripting language primarily used in Unix-like operating systems for system administration tasks and automation.
What term describes the command-line shell and scripting language primarily used in Unix-like operating systems?
Bash
What are Macros?
Macros are sequences of instructions or commands that are recorded and stored for automated execution, often used in productivity software such as Microsoft Office applications.
What term describes sequences of instructions recorded and stored for automated execution?
Macros
What is Visual Basic for Applications (VBA)?
Visual Basic for Applications (VBA) is a programming language developed by Microsoft for creating macros and automating tasks within software applications like Microsoft Office.
What term describes the programming language developed by Microsoft for creating macros and automating tasks?
Visual Basic for Applications (VBA)