Network Attacks (4.2) Flashcards

1
Q

Denial of Service (DoS) Attack

A

o Occurs when one machine continually floods a victim with requests for services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

TCP SYN Flood

A

TCP SYN Flood
▪ Occurs when an attacker initiates multiple TCP sessions, but never
completes them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Smurf Attack (ICMP Flood)

A

▪ Occurs when an attacker sends a ping to a subnet broadcast address with
the source IP spoofed to be that of the victim server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Distributed Denial of Service (DDoS) Attack

A

▪ Occurs when an attacker uses multiple computers to ask for access to the
same server at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Botnet

A

o A collection of compromised computers under the control

of a master node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Zombie

A

o Any of the individually compromised computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

On-Path/ Man-in-the-Middle (MITM) Attack

A

▪ Occurs when an attacker puts themselves between the victim and the
intended destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Session Hijacking

A

▪ Occurs when an attacker guesses the session ID that is in use between a
client and a server and takes over the authenticated session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DNS Poisoning

A

▪ Occurs when an attacker manipulates known vulnerabilities within the
DNS to reroute traffic from one site to a fake version of that site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DNSSEC

A

▪ Uses encrypted digital signatures when passing DNS information between
servers to help protect it from poisoning
▪ Ensure server has the latest security patches and updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Rogue DHCP Server

A

▪ A DHCP server on a network which is not under the administrative
control of the network administrators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Spoofing

A

▪ Occurs when an attacker masquerades as another person by falsifying
their identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IP Spoofing

A

▪ Modifying the source address of an IP packet to hide the identity of the
sender or impersonate another client
▪ IP spoofing is focused at Layer 3 of the OSI model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

MAC Spoofing

A

▪ Changing the MAC address to pretend the use of a different network
interface card or device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

MAC Filtering

A

▪ Relies on a list of all known and authorized MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ARP Spoofing

A

▪ Sending falsified ARP messages over a local area network
▪ ARP spoofing attack can be used as a precursor to other attacks
▪ Set up good VLAN segmentation within your network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

VLAN Hopping

A

▪ Ability to send traffic from one VLAN into another, bypassing the VLAN
segmentation you have configured within your Layer 2 networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Double Tagging

A

▪ Connecting to an interface on the switch using access mode with the
same VLAN as the native untagged VLAN on the trunk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Switch Spoofing

A

▪ Attempting to conduct a Dynamic Trunking Protocol (DTP) negotiation
▪ Disable dynamic switchport mode on your switchports

20
Q

Malware

A

▪ Designed to infiltrate a computer system and possibly damage it without
the user’s knowledge or consent

21
Q

Virus

A

▪ Made up of malicious code that is run on a machine without the user’s
knowledge and infects it whenever that code is run

22
Q

Worm

A

▪ A piece of malicious software that can replicate itself without user
interaction

23
Q

Trojan Horse

A

▪ A piece of malicious software disguised as a piece of harmless or
desirable software

24
Q

Remote Access Trojan (RAT)

A

▪ Provides the attacker with remote control of a victim machine

25
Q

Ransomware

A

▪ Restricts access to a victim’s computer system or files until a ransom or
payment is received

26
Q

Spyware

A

▪ Gathers information about you without your consent

27
Q

Key Logger

A

▪ Captures any key strokes made on the victim machine

28
Q

Rootkit

A

▪ Designed to gain administrative control over a computer system or
network device without being detected

29
Q

Rogue Access Point

A

▪ A wireless access point that has been installed on a secure network
without authorization from a local network administrator

30
Q

Shadow IT

A

▪ Use of IT systems, devices, software, applications, or services without the
explicit approval of the IT department

31
Q

Evil Twin

A

▪ Wireless access point that uses the same name as your own network

32
Q

Deauthentication

A

▪ Attempts to interrupt communication between an end user and the
wireless access point

33
Q

Dictionary Attack

A

▪ Guesses the password by attempting to check every single word or
phrase contained within a word list, called a dictionary
▪ Do not use anything that looks like a regular word

34
Q

Brute Force Attack

A

▪ Tries every possible combination until they figure out the password
▪ Use a longer and more complicated password

35
Q

Hybrid Attack

A

▪ Combination of dictionary and brute force attacks

36
Q

Wireless Interception

A

▪ Captures wireless data packets as they go across the airwaves

37
Q

Wireless Interception

A

▪ Captures wireless data packets as they go across the airwaves

38
Q

Social Engineering

A

▪ Any attempt to manipulate users to reveal confidential information or
perform actions detrimental to a system’s security
▪ The weakest link is our end users and employees

39
Q

Phishing

A

▪ Sending an email in an attempt to get a user to click a link
▪ Sending out emails to capture the most people and doesn’t really target
any particular person or group

40
Q

Spearphishing

A

▪ More targeted form of phishing

41
Q

Whaling

A

▪ Focused on key executives within an organization or other key leaders,
executives, and managers in the company

42
Q

Tailgating

A

▪ Entering a secure portion of the organization’s building by following an
authorized person into the area without their knowledge or consent

43
Q

Piggybacking

A

▪ Similar to tailgating, but occurs with the employee’s knowledge or
consent

44
Q

Shoulder Surfing

A

▪ Coming up behind an employee and trying to use direct observation
to obtain information

45
Q

Dumpster Diving

A

▪ Scavenging for personal or confidential information in garbage or
recycling containers

46
Q

Insider Threat

A

o An employee or other trusted insider who uses their authorized network access
in unauthorized ways to harm the company

47
Q

Logic Bomb

A

o A specific type of malware that is tied to either a logical event or a specific time