Chapter 4 Network Attack Indicators Flashcards

1
Q

What is an Evil Twin Attack?

A

An attack against the wireless protocol via substitute hardware. The attack uses an access point owned by an attacker that usually has been enhanced with high-power and higher-gain antennas to look like a better connection to the users and compuuters attaching to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Rouge Access Point?

A

An Access Point that is usually placed on an internal network either by accident or for nefarious reasons.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Bluesnarfing?

A

Copying off the victims info such as e-mails, contact lists, calendars, and anything else that exists on that device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Bluejacking?

A

Sending unauthorized messages to another Bluetooth device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Disassociation Attacks?

A

Attacks against a wireless system designed to disassociate a host from the wireless access point and from the wireless network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Jamming?

A

A form of denial of service that specifically targets the radio spectrum aspect of wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Radio Frequency Identification (RFID) tags

A

Tags used to identify someone via radio frequency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Near Field Communications (NFC)?

A

A set of wireless tech that enable smartphones and other devices to establish radio communication over a short distance around 10 cm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Initialization Vector (IV)?

A

Used in wireless systems as the randomization element at the beginning of a connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the Man in the browser (MITB) attack?

A

A varient of a man in the middle attack, The first element is a malware attack that places a trojan element that can act as a proxy on the target machine. When a user enters info like entering a financial transaction, the malware takes that information after input and then changes it to performs another transaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Address Resolution Protocol (ARP) Poisoning?

A

When an attacker sends messages, corrupts the ARP table, and causes packets to be misrouted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is MAC flooding?

A

An attack where an attacker floods the table with addresses, making the switch unable to find the correct address for a packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is MAC cloning?

A

The act of changing a MAC address to bypass security checks based on the MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is Domain Hijacking?

A

The act of changing the registration of a domain name without the permission of its original registrant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is DNS poisoning?

A

An attacker changes a DNS record through any of a multitude of means

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a Universal Resource Locator (URL) Redirection?

A

a vulnerability which allows an attacker to force users of your application to an untrusted external site.

17
Q

What is a Distributed Denial-of-service (DDoS) attack?

A

An attacker attempts to deny authorized users access either to specific information or to the computer system or network itself

18
Q

What is a SYN flood attack?

A

The attacker sends fake communication requests to the targeted system. Which will be answered by the target system, then waits for the third part of the handshake which never come. With enough of them it can crash the system

19
Q

What are Operational Technology (OT)?

A

Networks of industrial devices in cyber physical systems, These devices control physical processes like traffic lights, to refineries, and manufacturing plants

20
Q

What is powershell?

A

A built-in command line tool suite that has a set of Windows commands

21
Q

What are Macros?

A

Recorded sets of instructions, typically presented to an application to automate their function

22
Q

Visual Basic for Applications (VBA) is a type of what?

A

Macro