1.4 Network Attacks Flashcards

1
Q

Rogus access points

A

is an access point that has been added to your network without your authorization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

wireless evil twin

A

access point that is designed to look exactly like the access points that are already on your network, but they were put there for a malicious reason

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bluejacking

A

attacker sending an unsolicited message to a victim’s machine, usually this is a mobile phone or tablet, and the attacker is sending this message over Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bluesnarfing

A

when an attacker can access data that’s on your mobile device using the Bluetooth communications channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

wireless disassociation

A

keeps coming back and disappearing over and over and over again

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

RFID

A

Radio-Frequency Identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

NFC

A

Near Field Communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

on path attack (man in the middle)

A

an attacker that sits in the middle between two stations and is able to intercept, and in some cases, change that information that’s being sent interactively across the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ARP

A

Address Resolution Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ARP poisoning

A

manipulating the Address Resolution Protocol (ARP) to link a hacker’s MAC address with the IP address of a legitimate device on a local network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

MAC address

A

Media Access Control address of a network card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

STP

A

Spanning Tree Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Denial of Service

A

causes a service to become unavailable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DDos

A

Distributed Denial of Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what is a DDos

A

going to use many, many, systems to attack a single service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

macros

A

applications have their own way of performing scripts

17
Q

VBA

A

Visual Basic for Applications

18
Q

threat actor

A

an entity responsible for an event that has an impact on the safety of another entity

19
Q

APT

A

advanced persistent threat

20
Q

attack vector

A

the method that the attacker will use to gain access to your computer or your network

21
Q
A