Common Attack Types Quiz Flashcards
What is the purpose of a DoS (Denial of Service) attack?
Resource Exhaustion
As opposed to the simple DoS attacks that usually are performed from a single system, a Distributed Denial of Service (DDoS( attack uses multiple compromised computer systems to perform the attack against its target.
True
Which of the following applies to a collection of intermediary compromised systems that can be used as a platform for a DDoS attack?
Botnet
What is the function of a C2 Server? (Command and Control Server)
Botnet Control
Which of the following statements can be used to describe the characteristics of an on-path attack? (Select all that apply)
An on-path attack is also known as MITM (Man in the Middle)
In an on-path attack, attackers place themselves on the communications route between two devices
In an on-path attack, attackers intercept or modify packets sent between two communicating devices
Remapping a domain name to a rogue IP address is an example of what kind of exploit?
DNS Poisoning
Switch spoofing and double tagging are attack methods used in:
VLAN hopping attacks
An attacker managed to associate his/her MAC address with the IP address of the default gateway. In result, a targeted host is sending network traffic to the attacker’s IP address instead of the IP address of the default gateway. Based on the given information, which type of attack is taking place in the this scenario?
ARP (Address Resolution Protocol) poisoning
The term “DHCP snooping” refers to an exploit that enables operation of a rogue DHCP network server.
False
The term “Evil twin” refers to a rogue Wireless Access Point (WAP) set up for the purpose of eavesdropping or stealing sensitive user data. Evil twin replaced the legitimate access point and by advertising its its presence with the same Service Set Identifier (SSID) appears as a legitimate access point to connecting hosts.
True
Malware that restricts access to a computer system by encrypting files or locking the entire down until the user performs requested action is known as:
Ransomeware
An attack against encrypted data relies heavily on computing power to check all possible keys and passwords until the correct one is found is known as:
Brute-force attack
Which password attack takes advantage of a predefined list of words?
Dictionary attack
An attack that relies on altering the burned-in address of a NIC to assume the identity of a different network host is known as: (Select 2 answers)
MAC spoofing
MAC cloning
Which of the following attacks relies on altering the source layer 3 address
IP spoofing