Network Attacks Flashcards

1
Q

Wireless
Evil Twin:

A

Unexpected duplicate wireless networks with similar names.
Sign: Users connecting to a malicious access point unwittingly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Wireless
Rogue Access Point:

A

Unauthorized wireless access points on the network.
Sign: Unauthorized devices connecting to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Wireless
Bluesnarfing:

A

Unauthorized access to Bluetooth-enabled devices.
Sign: Unauthorized access to Bluetooth devices and data theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Wireless
Bluejacking:

A

Unsolicited messages or files sent via Bluetooth.
Sign: Unexpected pop-up messages or files on Bluetooth devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Wireless
Disassociation:

A

Frequent disconnections from the wireless network.
Sign: Network interruptions and potential denial of service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Wireless
Jamming:

A

Sudden disruptions in wireless signal strength.
Sign: Inability to connect or maintain wireless connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Wireless
RFID/NFC Attacks:

A

Unauthorized RFID/NFC device scanning.
Sign: Unauthorized access to RFID/NFC data or systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Wireless
Initialization Vector (IV):

A

Abnormal patterns in IVs in wireless traffic.
Sign: Suspected encryption vulnerabilities or weak keys.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

On-Path Attack (MITM/MITB)
Unusual Network Behavior:

A

Suspicious redirection of traffic.
Sign: Intercepted or manipulated communication between parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Layer 2 Attacks
ARP Poisoning:

A

Frequent ARP table changes or conflicts.
Sign: Misdirected network traffic or man-in-the-middle attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Layer 2 Attacks
MAC Flooding:

A

Excessive MAC address table entries.
Sign: Network slowdown or failure due to resource exhaustion.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Layer 2 Attacks
MAC Cloning:

A

Duplicate MAC addresses on the network.
Sign: Unauthorized devices impersonating legitimate ones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DNS Attacks
Domain Hijacking:

A

Sudden changes in DNS records.
Sign: Unauthorized control over domain settings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

DNS Attacks
DNS Poisoning:

A

Incorrect DNS resolutions.
Sign: Users redirected to malicious websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DNS Attacks
URL Redirection:

A

Unwanted URL redirects.
Sign: Users directed to malicious websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DNS Attacks
Domain Reputation:

A

Frequent changes in domain reputation scores.
Sign: Suspicion of domain-based attacks.

17
Q

DDoS Attacks
Network DDoS:

A

Sudden spikes in network traffic.
Sign: Network unavailability or slowdown.

18
Q

DDoS Attacks
Application DDoS:

A

Unusual traffic patterns to specific applications.
Sign: Application unavailability or degraded performance.

19
Q

DDoS Attacks
OT DDoS:

A

Unexplained disruption in operational technology.
Sign: Manufacturing or industrial process interruptions.

20
Q

Malicious Code or Script Execution
Unusual Script Activity:

A

Execution of suspicious scripts.
Sign: Unauthorized system access or data manipulation.

21
Q

Malicious Code or Script Execution
Specific Script Languages:

A

Execution of PowerShell, Python, Bash, or VBA scripts.
Sign: Possible scripting attack or malicious automation.