Network Attacks Flashcards

1
Q

_____ is a scripting language for Microsoft Office that uses macros to perform a sequence of actions in the context of a word processor, spreadsheet, or presentation file.

A

Visual Basic for Applications (VBA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_____ refers to using an exploit in Bluetooth to steal information from someone else’s phone. The exploit (now patched) allows attackers to circumvent the authentication mechanism.

A

Bluesnarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_____ is an RFID attack where an attacker uses a fraudulent RFID reader to read the signals from a contactless bank card.

A

Skimming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A Bluetooth-discoverable device is vulnerable to _____, similar to spam, where someone sends an unsolicited text (or picture/video) message or vCard (contact details). This can be a vector for Trojan malware.

A

bluejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_____ is based on a particular type of radio frequency ID or RFID. It is commonly available on smartphones for processing wireless payments.

A

NFC or near field communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An _____ attack modifies the __ of an encrypted wireless packet during transmission to compute the RC4 keystream to decrypt all other wireless traffic. This attack becomes useless when WPA or WPA2 wireless protection is enabled.

A

Initialization Vector, IV

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_____ is used against network switches that aim to exhaust the memory used to store the switch’s MAC address table.

A

MAC flooding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

_____ is a scripting language for Microsoft Office that uses macros to perform a sequence of actions in the context of a word processor, spreadsheet, or presentation file.

A

Visual Basic for Applications (VBA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An _____ is a network attack that involves connections between embedded system devices.

A

operational technology attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An _____ attack targets vulnerabilities in the headers and payloads of specific application protocols. For example, one type of amplification attack targets DNS services with bogus queries.

A

application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A _____ attack aims at consuming network bandwidth and denying it to legitimate hosts. For example, a SYN flood attack works by withholding the client’s ACK packet during TCP’s three-way handshake.

A

network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

_____ occurs when the attacker would craft a malicious URL and convince the victim to submit it to the web server.

A

HTTP Response Splitting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

_____ is a malicious script hosted on the attacker’s site that can exploit a session started on another site in the same browser.

A

Cross-site Request Forgery (XSRF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_____ are data stored on a user’s computer by websites that use Adobe Flash Player.

A

Locally Shared Objects (LSOs), or Flash cookies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A _____ attack uses _____ packets to remove a known wireless access point (WAP) from a client’s list of available networks. This is a type of DoS on wireless networks.

A

disassociation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A _____ attack sends a stream of spoofed frames to cause a client to _____. This is a type of DoS attack on wireless networks.

A

deauthentication