Chapter 4 Network Attack Indicators Flashcards

1
Q

Wireless

A
  • A target for hackers.
  • A common networking technology that has a substantial number of standards and processes to connect users to networks via radio signals.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Evil Twin

A
  • An attack against the wireless protocol via substitute hardware.
  • Uses an access point owned by an attacker that usually has been enhanced with higher-power and higher-gain antennas.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Rouge Access Point

A
  • An attacker can attempt to get clients to connect to it as if it were authorized and then simply authenticate to the real access point.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Bluesnarfing

A
  • The attacker copies off the victim’s information, and other pertinent information on the person’s device.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Bluejacking

A
  • Sending of unauthorized messages to another Bluetooth device.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Disassociation

A
  • Attacks against a wireless system are attacks designed to disassociate a host from the wireless access point and from the wireless network.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Jamming

A
  • A form of denial of service that specifically targets the radio spectrum aspect of wireless.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Radio Frequency Identification (RFID)

A
  • RFID tags come in several different forms and can be classified as either active or passive.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Initialization Vector (IV)

A
  • Used in wireless systems as the randomization element at the beginning of a connection.
  • Attacks against it are aimed at determining the IV
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Near Field Communication (NFC)

A
  • Enables smartphones and other devices to establish radio communication over a short distance.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Media Access Control (MAC) Flooding

A
  • An attacker floods the table with addresses, making the switch unable to find the correct address for a packet.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

MAC Cloning

A
  • The act of changing a MAC address to bypass security checks based on the MAC address.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Domain Name System (DNS)

A
  • The phone book for addressing
  • Provides the correct address to get the pack destination.
  • Can control where all the packets go.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DNS Poisoning

A
  • When changes to the network occur resulting in different DNS lookups.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Domain Hijacking

A
  • The act of changing the registration of a domain name without permission of its original registration.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

nslookup

A
  • ## This command shows a series of DNS queries executed on a Windows machine.
15
Q

Universal Resource Locator (URL) Redirection

A
  • Man in the Middle attack where all your traffic is being read and redirected.
16
Q

Domain Reputation

A
  • If you do not protect your address, an attacker make associate your IP address with spam, botnets, or other bad behaviors, then the reputation of the IP address will suffer.
17
Q

Denial-of-Service (DoS) Attack

A
  • The attacker attempts to deny authorized users access to specific information or to the computer system or network itself.
18
Q

Distributed Denial-of-Service (DDoS) Attack

A
  • Sending so many requests that the machine is overwhelmed.
19
Q

How is a NETWORK used in a DDoS attack

A
  • A network of attack agents (Zombies) is created by the attacker, and upon receiving the attack command from the attacker.
20
Q

How can applications be compromised by a DDoS attack?

A
  • The objective of an application level DDoS attack is to consume all resources or to put the system into a failed state.
21
Q

Operational Technology (OT)

A
  • The name given to networks of industrial devices in cyber-physical systems.
  • Usually computers control physical processes.
22
Q

PowerShell

A
  • A built-in command-line tool suite that has a rich set of Microsoft Windows commands.
  • Completely integrated with the Windows Environment.
  • Used
23
Q

Python

A
  • An effective scripting tool used for good at automating tasks and data analysis.
24
Q

Bash, Bourne Again Shell

A
  • An interpreter that processes shell commands on Linux system.
  • Takes commands in plaintext format and calls OS services to perform the specified tasks.
25
Q

Macros

A
  • Recorded sets of instructions, typically presented to an application to automate their function.
  • Comes the risk in the form of unwanted macros calling the system and performing system activities.
26
Q

Visual Basic for Applications (VBA)

A
  • An older technology from Microsoft that was used to automate many internal processes in applications.
  • Even though this is an outdated tool, still can be used as a vector for attackers.