Network Attacks Flashcards

1
Q

Denial of Service

A

Occurs when one machine continually floods a victim with requests for services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

TCP SYN Flood

A

Occurs when an attacker initiates multiple TCP sessions, but never completes them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Smurf Attack (ICMP Flood)

A

Occurs when an attacker sends a ping to a subnet broadcast address with the source IP spoofed to be that of the victim server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Distributed Denial of Service (DDOS)

A

Occurs when an attacker uses multiple computers to ask for access to the same server at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Botnet

A

A collection of compromised computers under the control of a master node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

On-Path/Man-in-the-Middle (MITM) Attack

A

Occurs when an attacker puts themselves between the victim and the intended destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Session Hijacking

A

Occurs when an attacker guesses the session ID that is in use between a client and a server and takes over the authenticated session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DNS Poisoning

A

Occurs when an attacker manipulates known vulnerabilities within the NDS to reroute traffic from one site to a fake version of that site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DNSSEC

A

Uses encrypted digital signatures when passing DNS information between servers to help protect it from poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Rogue DHCP Server

A

A DHCP server on a network which is not under the administrative control of the network administrators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Spoofing

A

Occurs when an attacker masquerades as another person by falsifying their identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IP Spoofing

A

Modifying the source address of an IP packet to hide the identity of the send or impersonate another client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

MAC Spoofing

A

Changing the MAC address to pretend the use of a different network interface card or device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

MAC Filtering

A

Relies on a list of all known and authorized MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

ARP Spoofing

A

Sending falsified ARP messages over a local area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

VLAN Hopping

A
  • Ability to send traffic from on VLAN into another, bypassing the VLAN segmentation you have configured within your Layer 2 networks
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Double Tagging

A

Connecting to an interface on the switch using access mode with the same VLAN as the native untagged VLAN on the trunk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Switch Spoofing

A

Attempting to conduct a Dynamic Trunking Protocol (DTP) negotiation

19
Q

Malware

A

Designed to infiltrate a computer system and possibly damage it without the user’s knowledge or consent

20
Q

Virus

A

Made up of malicious code that is run on a machine without the user’s knowledge and infects it whenever that code is run

21
Q

Worm

A

A piece of malicious software that can replicate itself without user interaction

22
Q

Trojan Horse

A

A piece of malicious software disguised as a piece of harmless or desirable software

23
Q

Remote Access Trojan (RAT)

A

Provides the attacker with remote control of a victim machine

24
Q

Ransomware

A

Restricts access to a victim’s computer system or files until a ransom or payment is received

25
Q

Spyware

A

Gathers information about you without your consent

26
Q

Key Logger

A

Captures any key stroke made on the victim machine

27
Q

Rootkit

A

Designed to gain administrative control over a computer system or network device without being detected

28
Q

Rogue Access Point

A

A wireless access point that has been installed on a secure network without authorization from a local network administrator

29
Q

Shadow IT

A

Use of IT systems, devices, software, applications, or services without the explicit approval of the IT department

30
Q

Evil Twin

A

Wireless access point that uses the same name as your own network

31
Q

Deauthentication

A

Attempts to interrupt communication between an end user and the wireless access point

32
Q

Dictionary Attack

A

Guesses the password by attempting to check every single word or phrase contained within a word list, called a dictionary

33
Q

Brute Force Attack

A

Tries every possible combination until they figure out the password

34
Q

Hybrid Attack

A

Combination of dictionary and brute force attacks

35
Q

Wireless Interception

A
  • Captures wireless data packets as they go across the airwaves
36
Q

Social Engineering

A

Any attempt to manipulate users to reveal confidential information or perform action detrimental to a system’s security

37
Q

Phishing

A

Sending an email in an attempt to get a user to click a link

38
Q

Whaling

A

Focused on key executives with an organization or other key leaders, executives, and managers in the company

39
Q

Tailgating

A

Entering a secure portion of the organization’s building by following an authorized person into the area without their knowledge or consent

40
Q

Piggybacking

A

Similar to tailgating, but occurs with the employee’s knowledge or consent

41
Q

Shoulder Surfing

A

Coming up behind an employee and trying to use direct observation to obtain information

42
Q

Dumpster Diving

A

Scavenging for personal or confidential information in garbage or recycling containers

43
Q

Insider Threat

A

An employee or other trusted insider who uses their authorized network access in unauthorized ways to harm the company

44
Q

Logic Bomb

A

A specific type of malware that is tied to either a logical event or a specific time