Network Attacks Flashcards

1
Q

Denial of Service (DoS) Attack

A

Occurs when one machine continually floods a victim with requests for services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Distributed Denial of Service (DDoS) Attack

A

Occurs when an attacker uses multiple computers to ask for access to the
same server at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Botnet

A

A collection of compromised computers (zombies) under the control of a master node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

On-Path/ Man-in-the-Middle (MITM) Attack

A

Occurs when an attacker puts themselves between the victim and the
intended destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DNS Poisoning

A

Occurs when an attacker manipulates known vulnerabilities within the
DNS to reroute traffic from one site to a fake version of that site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Rogue DHCP Server

A

A DHCP server on a network which is not under the administrative
control of the network administrators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IP Spoofing

A

Modifying the source address of an IP packet to hide the identity of the
sender or impersonate another client
IP spoofing is focused at Layer 3 of the OSI model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

MAC Spoofing

A

Changing the MAC address to pretend the use of a different network
interface card or device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

MAC Filtering

A

Relies on a list of all known and authorized MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ARP Spoofing and prevention

A

Sending falsified ARP messages
that can be used as a precursor to other attacks
set up good VLAN segmentation within your network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

VLAN Hopping

A

Ability to send traffic from one VLAN into another, bypassing the VLAN
segmentation you have configured within your Layer 2 networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Malware

A

Designed to infiltrate a computer system and possibly damage it without
the user’s knowledge or consent

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Ransomware

A

Restricts access to a victim’s computer system or files until a ransom or
payment is received

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Rogue Access Point

A

A wireless access point that has been installed on a secure network
without authorization from a local network administrator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Evil Twin

A

Wireless access point that uses the same name as your own network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Deauthentication

A

Attempts to interrupt communication between an end user and the
wireless access point

17
Q

Social Engineering

A

Any attempt to manipulate users to reveal confidential information or
perform actions detrimental to a system’s security
The weakest link is our end users and employees

18
Q

Phishing

A

Sending an email in an attempt to get a user to click a link
Sending out emails to capture the most people and doesn’t really target
any particular person or group

19
Q

Spearphishing

A

More targeted form of phishing

20
Q

Whaling

A

Focused on key executives within an organization or other key leaders,
executives, and managers in the company

21
Q

Tailgating

A

Entering a secure portion of the organization’s building by following an
authorized person into the area without their knowledge or consent

22
Q

Piggybacking

A

Similar to tailgating, but occurs with the employee’s knowledge or
consent

23
Q

Shoulder Surfing

A

Coming up behind an employee and trying to use direct observation
to obtain information

24
Q

Insider Threat

A

An employee or other trusted insider who uses their authorized network access
in unauthorized ways to harm the company