Network Attacks Flashcards

1
Q

Denial of Service

A

Occurs when one machine continually floods a victim with requests for services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

TCP SYN Flood

A

Occurs when an attacker initiates multiple TCP sessions, but never completes them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Smurf Attack (ICMP Flood)

A

Occurs when an attacker sends a ping to a subnet broadcast address with the source IP spoofed to be that of the victim server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Distributed Denial of Service (DDOS)

A

Occurs when an attacker uses multiple computers to ask for access to the same server at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Botnet

A

A collection of compromised computers under the control of a master node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

On-Path/Man-in-the-Middle (MITM) Attack

A

Occurs when an attacker puts themselves between the victim and the intended destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Session Hijacking

A

Occurs when an attacker guesses the session ID that is in use between a client and a server and takes over the authenticated session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DNS Poisoning

A

Occurs when an attacker manipulates known vulnerabilities within the NDS to reroute traffic from one site to a fake version of that site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DNSSEC

A

Uses encrypted digital signatures when passing DNS information between servers to help protect it from poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Rogue DHCP Server

A

A DHCP server on a network which is not under the administrative control of the network administrators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Spoofing

A

Occurs when an attacker masquerades as another person by falsifying their identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IP Spoofing

A

Modifying the source address of an IP packet to hide the identity of the send or impersonate another client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MAC Spoofing

A

Changing the MAC address to pretend the use of a different network interface card or device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

MAC Filtering

A

Relies on a list of all known and authorized MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ARP Spoofing

A

Sending falsified ARP messages over a local area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

VLAN Hopping

A
  • Ability to send traffic from on VLAN into another, bypassing the VLAN segmentation you have configured within your Layer 2 networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Double Tagging

A

Connecting to an interface on the switch using access mode with the same VLAN as the native untagged VLAN on the trunk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Switch Spoofing

A

Attempting to conduct a Dynamic Trunking Protocol (DTP) negotiation

19
Q

Malware

A

Designed to infiltrate a computer system and possibly damage it without the user’s knowledge or consent

20
Q

Virus

A

Made up of malicious code that is run on a machine without the user’s knowledge and infects it whenever that code is run

21
Q

Worm

A

A piece of malicious software that can replicate itself without user interaction

22
Q

Trojan Horse

A

A piece of malicious software disguised as a piece of harmless or desirable software

23
Q

Remote Access Trojan (RAT)

A

Provides the attacker with remote control of a victim machine

24
Q

Ransomware

A

Restricts access to a victim’s computer system or files until a ransom or payment is received

25
Spyware
Gathers information about you without your consent
26
Key Logger
Captures any key stroke made on the victim machine
27
Rootkit
Designed to gain administrative control over a computer system or network device without being detected
28
Rogue Access Point
A wireless access point that has been installed on a secure network without authorization from a local network administrator
29
Shadow IT
Use of IT systems, devices, software, applications, or services without the explicit approval of the IT department
30
Evil Twin
Wireless access point that uses the same name as your own network
31
Deauthentication
Attempts to interrupt communication between an end user and the wireless access point
32
Dictionary Attack
Guesses the password by attempting to check every single word or phrase contained within a word list, called a dictionary
33
Brute Force Attack
Tries every possible combination until they figure out the password
34
Hybrid Attack
Combination of dictionary and brute force attacks
35
Wireless Interception
- Captures wireless data packets as they go across the airwaves
36
Social Engineering
Any attempt to manipulate users to reveal confidential information or perform action detrimental to a system's security
37
Phishing
Sending an email in an attempt to get a user to click a link
38
Whaling
Focused on key executives with an organization or other key leaders, executives, and managers in the company
39
Tailgating
Entering a secure portion of the organization's building by following an authorized person into the area without their knowledge or consent
40
Piggybacking
Similar to tailgating, but occurs with the employee's knowledge or consent
41
Shoulder Surfing
Coming up behind an employee and trying to use direct observation to obtain information
42
Dumpster Diving
Scavenging for personal or confidential information in garbage or recycling containers
43
Insider Threat
An employee or other trusted insider who uses their authorized network access in unauthorized ways to harm the company
44
Logic Bomb
A specific type of malware that is tied to either a logical event or a specific time