Common Types of Attacks Flashcards
Which type of attack exploits the native VLAN of 802.1Q?
a. Evil twin
b. Tailgating
c. Deauthentication
d. VLAN hopping
Answer: d. A VLAN hopping attack leverages two technologies in its operation: Q-in-Q tunneling and the native VLAN feature.
In what type of attack does the attacker compromise multiple systems and then
instruct those compromised systems, called zombies, to simultaneously flood a
target system with traffic?
a. DoS attack
b. TCP SYN flood attack
c. Buffer overflow
d. DDoS attack
Answer: d. A distributed denial-of-service (DDoS) attack involves many systems to compromise the availability of a system.
Which of the following is an example of a social engineering attack?
a. DDoS attack
b. DoS attack
c. Piggybacking
d. On-path attack
Answer: c. Piggybacking is a social engineering attack in which an authorized
user permits an unauthorized user to access an area or systems. The unauthorized user may follow closely behind the authorized user through some type of
security checkpoint.
In what type of attack does the attacker try all possible password combinations
until a match is made?
a. Dictionary attack
b. MAC spoofing
c. IP spoofing
d. Brute-force attack
Answer: d. In a brute-force password attack, the attacker tries all possible
password combinations until a match is made. For example, a brute-force
attack might start with the letter a and go through the letter z, and then the
attacker might attempt the letters aa through zz, continuing to try combinations until the password is determined. Using complicated passwords—with
a mixture of upper- and lowercase letters as well as special characters and
numbers—can help prevent brute-force attacks.
What type of attack often seeks payment in bitcoin or other cryptocurrency?
a. Malware
b. DDoS
c. Ransomware
d. DNS poisoning
Answer: c. Ransomware is an attack that involves the demand of a ransom
(often in cryptocurrency) for access to files or systems to be restored.