Common Types of Attacks Flashcards

1
Q

Which type of attack exploits the native VLAN of 802.1Q?
a. Evil twin
b. Tailgating
c. Deauthentication
d. VLAN hopping

A

Answer: d. A VLAN hopping attack leverages two technologies in its operation: Q-in-Q tunneling and the native VLAN feature.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In what type of attack does the attacker compromise multiple systems and then
instruct those compromised systems, called zombies, to simultaneously flood a
target system with traffic?
a. DoS attack
b. TCP SYN flood attack
c. Buffer overflow
d. DDoS attack

A

Answer: d. A distributed denial-of-service (DDoS) attack involves many systems to compromise the availability of a system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is an example of a social engineering attack?
a. DDoS attack
b. DoS attack
c. Piggybacking
d. On-path attack

A

Answer: c. Piggybacking is a social engineering attack in which an authorized
user permits an unauthorized user to access an area or systems. The unauthorized user may follow closely behind the authorized user through some type of
security checkpoint.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

In what type of attack does the attacker try all possible password combinations
until a match is made?
a. Dictionary attack
b. MAC spoofing
c. IP spoofing
d. Brute-force attack

A

Answer: d. In a brute-force password attack, the attacker tries all possible
password combinations until a match is made. For example, a brute-force
attack might start with the letter a and go through the letter z, and then the
attacker might attempt the letters aa through zz, continuing to try combinations until the password is determined. Using complicated passwords—with
a mixture of upper- and lowercase letters as well as special characters and
numbers—can help prevent brute-force attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of attack often seeks payment in bitcoin or other cryptocurrency?
a. Malware
b. DDoS
c. Ransomware
d. DNS poisoning

A

Answer: c. Ransomware is an attack that involves the demand of a ransom
(often in cryptocurrency) for access to files or systems to be restored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly