Mod 4: CNO Methodology - PE Flashcards

1
Q

What CNE attack places the attacker in the flow of traffic with the ability to view, Modify, or drop frames in real-time?

  • ARP Poisoning
  • DNS Poisoning
  • DNS Spoofing
  • MitM Attack
A

MitM Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What exploit/attack includes a Rogue Access Point?

A

evil twin attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This attack type involves and attacker disguising themselves as an application by altering packet headers in an IP address. As a result, users attempting to access a URL connected to the application are sent to the attackers website.

A

IP spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This is the process of linking attackers MAC address with the IP address of a legitimate user on a Local Area Network using fake ARP messages. As a result, data sent by the user to the host IP address is instead transmitted to the attacker.

A

ARP spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This attack involves infiltrating a DNS server and altering a website’s address record. As a result, users attempting to access the site are sent by the altered DNS record to the attackers site. ALSO, this is attack is also referred to as what?

A

DNS spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When assigned or searching for a new target, analysts will source as much intel as possible from all available databases and sources. This is called:

A

Initial intel dump

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This attack affects the stations other than the intended targets, and limits or totally blocks the availability of network resources.

  • CTS Attack
  • CBTC Attack
  • Denial of Service (DoS)
  • Man in the Middle (MitM)
A

Denial of Service (DoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This attack sends spoofed CTS frames or sends repeated RTS frames to an AP forcing the AP to send CTS commands.

  • CBTC Attack
  • Denial of Service (DoS)
  • CTS Attack
  • IP Spoofing
A

CTS Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This attack causes a client to have to reauthenticate/reassociate with their AP.

  • ARP poisoning
  • Denial of Service (DoS)
  • Deauthentication Attack
  • CTS Attack
A

Deauthentication Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The intentional use of RF energy to deny or degrade wireless communications.

  • Jamming
  • RF theory
  • 802.11ab
  • Evil Twin Attack
A

Jamming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Taking multiple LOBs (Line of Bearing) from different directions/angles creates what’s known as a _____, similar to triangulating a position.

A

fix

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How many LOBs (Line of Bearing) are needed to produce an effective fix?

A

3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is considered much more accurate than a DF, and uses algorithms to produce an MGRS?

A

Geolocation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Jamming is associated with the unintentional degradation of wireless communication efforts.

[True / False]

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When an analyst is provided with a new target, what surveys should the analyst begin with?

  • 2.4GHz band and all associated channels
  • 5GHz band and all associated channels
  • MAC addresses, IP addresses, SSIDs, encryptions and channels
  • All the above
A

All the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What tool is commonly and widely used to perform packet capture?

A

wireshark

17
Q

Target nomination will depend on criteria defined for each mission provided by :

  • The analyst’s unit
  • The analyst themselves
  • A divine deity
  • SGM of the Army
A

The analyst’s unit

*guess - I got this one wrong

18
Q

An attacker can initiate a(n) _______________ to get victims to associate with the new rogue AP.

  • IP request
  • Denial of Service (DOS)
  • Deauthentication
  • Reauthentication
A

Deauthentication

19
Q

CNA operations are designed to DENY, DEGRADE, DISRUPT, or __________ a targets ability to transmit data on a network.

  • DODGE
  • DIP
  • DIVE
  • DESTROY
A

DESTROY

20
Q

Active & Passive operations to gain access to target information systems is called :

  • Continue Collection
  • Conduct CNE
  • Conduct CNA
  • Kill/Capture
A

Conduct CNE

21
Q

What is the final part of the Find/Fix/Finish picture. where POL efforts must be used to ensure time/location?

  • Continue Collection
  • Conduct CNE
  • Conduct CNA
  • Kill/Capture
A

Kill/Capture

22
Q

What is target collecting as able to maintain target awareness, but no action is taken at this time.

  • Continue Collection
  • Conduct CNE
  • Conduct CNA
  • Kill/Capture
A

Continue Collection

23
Q

Must be careful when conducting this activity, since disruption, denial, or degradation of target systems and their ability to communicate result in a DoS that will disrupt future collection efforts.

  • Continue Collection
  • Conduct CNE
  • Conduct CNA
  • Kill/Capture
A

Conduct CNA