1.4 Given a scenario, analyze potential indicators associated with network attacks Flashcards
What is Wireless?
Wireless refers to the transmission of data over radio waves without the need for physical cables or connections.
What term describes the transmission of data over radio waves without physical connections?
Wireless
What is an Evil twin?
An Evil twin is a rogue wireless access point that masquerades as a legitimate Wi-Fi network to intercept data or deceive users.
What term describes a rogue wireless access point that impersonates a legitimate network?
Evil twin
What is a Rogue access point?
A Rogue access point is an unauthorized wireless access point that has been installed on a network without explicit authorization from the network administrator.
What term describes an unauthorized wireless access point installed without authorization?
Rogue access point
What is Bluesnarfing?
Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection, often without the user’s knowledge or consent.
What term describes the unauthorized access of information from a wireless device through Bluetooth?
Bluesnarfing
What is Bluejacking?
Bluejacking is the unauthorized sending of unsolicited messages or spam to Bluetooth-enabled devices, often for the purpose of advertising or harassment.
What term describes the unauthorized sending of unsolicited messages to Bluetooth-enabled devices?
Bluejacking
What is Disassociation?
Disassociation is the deliberate termination of a Wi-Fi connection between a wireless device and an access point, often used as a method of attack to disrupt connectivity.
What term describes the deliberate termination of a Wi-Fi connection between a device and an access point?
Disassociation
What is Jamming?
Jamming is the interference with wireless signals, typically through the transmission of noise or radio frequency interference, to disrupt communication or block signals.
What term describes the interference with wireless signals to disrupt communication or block signals?
Jamming
What is Radio frequency identification (RFID)?
Radio frequency identification (RFID) is a technology that uses radio waves to identify and track objects, often used in inventory management, access control, or payment systems.
What term describes the technology that uses radio waves to identify and track objects?
Radio frequency identification (RFID)
What is Nearfield communication (NFC)?
Nearfield communication (NFC) is a short-range wireless technology that allows for contactless communication between devices, commonly used in mobile payment systems and access control.
What term describes the short-range wireless technology that allows for contactless communication between devices?
Nearfield communication (NFC)
What is an Initialization vector (IV)?
An Initialization vector (IV) is a random or semi-random value used in encryption algorithms to ensure unique ciphertexts, preventing patterns or repetition in encrypted data.
What term describes a value used in encryption algorithms to ensure unique ciphertexts?
Initialization vector (IV)
What is an On-path attack?
An On-path attack, previously known as a man-in-the-middle attack or man-in-the-browser attack, is a type of cyber attack where the attacker intercepts and manipulates communication between two parties without their knowledge.
What term describes a cyber attack where the attacker intercepts and manipulates communication between two parties without their knowledge?
On-path attack (previously known as man-in-the-middle attack/ man-in-the-browser attack)