Chapter 4 Network Attack Indicators Flashcards
1
Q
Wireless
A
- A target for hackers.
- A common networking technology that has a substantial number of standards and processes to connect users to networks via radio signals.
2
Q
Evil Twin
A
- An attack against the wireless protocol via substitute hardware.
- Uses an access point owned by an attacker that usually has been enhanced with higher-power and higher-gain antennas.
3
Q
Rouge Access Point
A
- An attacker can attempt to get clients to connect to it as if it were authorized and then simply authenticate to the real access point.
4
Q
Bluesnarfing
A
- The attacker copies off the victim’s information, and other pertinent information on the person’s device.
5
Q
Bluejacking
A
- Sending of unauthorized messages to another Bluetooth device.
6
Q
Disassociation
A
- Attacks against a wireless system are attacks designed to disassociate a host from the wireless access point and from the wireless network.
7
Q
Jamming
A
- A form of denial of service that specifically targets the radio spectrum aspect of wireless.
8
Q
Radio Frequency Identification (RFID)
A
- RFID tags come in several different forms and can be classified as either active or passive.
9
Q
Initialization Vector (IV)
A
- Used in wireless systems as the randomization element at the beginning of a connection.
- Attacks against it are aimed at determining the IV
9
Q
Near Field Communication (NFC)
A
- Enables smartphones and other devices to establish radio communication over a short distance.
10
Q
Media Access Control (MAC) Flooding
A
- An attacker floods the table with addresses, making the switch unable to find the correct address for a packet.
11
Q
MAC Cloning
A
- The act of changing a MAC address to bypass security checks based on the MAC address.
12
Q
Domain Name System (DNS)
A
- The phone book for addressing
- Provides the correct address to get the pack destination.
- Can control where all the packets go.
13
Q
DNS Poisoning
A
- When changes to the network occur resulting in different DNS lookups.
13
Q
Domain Hijacking
A
- The act of changing the registration of a domain name without permission of its original registration.