Network Attacks Flashcards

1
Q

Unauthorized wireless access point in your network. Not necessarily malicious. Significant backdoor.

A

Rogue Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

the process of restricting unauthorized users and devices from gaining access to a corporate or private network

A

Network Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Designed to look like your network’s access points and use the same settings, but is a malicious access point. Trying to overpower the existing access points.

A

Wireless Evil Twin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Attacker sends unsolicited message to a machine through bluetooth. Low priority security concern.

A

Bluejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Attacker access data on your mobile device using the bluetooth communications channel.

A

Bluesnarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Attacker disrupts connections between users and Wi-fi access points, and forces users to get into a network the attacker controls.

A

Wireless Disassociation attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Blocking a wireless device from communicating with other devices or a wireless network

A

Radio Frequency Jamming (RF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Hunting a Wireless jamming source with an antenna.

A

Fox Hunt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Technology that uses radio waves to identify people or objects. A device that reads information contained in a wireless device or “tag” from a distance without making any physical contact or requiring a line of sight. Susceptible to replay attacks, spoofing, data capture, and decryption.

A

RFID - (Radio Frequency Identification)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Short-range wireless technology that allows your phone to act as a transit pass or credit card, quickly transfer data, or instantly pair with Bluetooth devices like headphones and speakers.

A

NFC - (Near Field Communication)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A number used to protect private communications by preventing replay attacks. For the time being.

A

Cryptographic Nonce

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Arbitrary number that can be used with a secret key for data encryption to foil cyber attacks.

A

Initialization Vector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Attacker sits in the middle between two stations and is able to intercept, and in some cases, change that information that’s being sent interactively across the network. Redirects traffic. Also known as Man In The Middle attack.

A

On-Path Attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

On-path attack on the local IP subnet. It has no security.

A

ARP Poisoning (Address Resolution Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Attacker is in the same computer, and a malware/trojan does the proxy work. Formerly known as man-in-the-browser.

A

On-Path Browser attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Attacker floods the switch’s MAC table and uses the switch as a hub and attacker captures all network traffic.

A

MAC Flooding

17
Q

Way that switches protect themselves from MAC flooding.

A

Flood Guard

18
Q

Attacker changes their MAC address to match the MAC address of an existing user.

A

MAC spoof / clone

19
Q

Happens when fake information is entered into the cache of a domain name server, resulting in DNS queries producing an incorrect reply, sending users to the wrong website

A

DNS Poisoning / Spoofing

20
Q

Attacker makes a service unavailable. Or they could be using a DoS as a smokescreen.

A

Denial of Service

21
Q

If you plug in the wrong cables to the wrong switch, you may inadvertently create a loop in your network, and cause the entire network to become unavailable.

A

Friendly DoS

22
Q

Here many devices might be used simultaneously to create bandwidth spikes or attack a particular service and cause it to be unavailable.

A

DDoS Distributed Denial of Service Attack

23
Q

Taking a small attack and make it arrive into the victim’s machine as a bigger attack.

A

DDoS Amplification

24
Q

Programs used to automate frequently used processes or tasks in Excel.

A

Macros