Network + Ch1 Flashcards
What is Typosquatting?
URL hijacking where a malicious domain mimics a legitimate one(g00gle vs google.com)
How does Pretexting work?
The attacker creates a false story to trick a victim into giving up sensitive information.
What is Pharming?
A poisoned DNS redirects users to fake websites instead of legitimate ones.
What is Vishing?
Voice phishing using spoofed numbers to extract information via phone calls.
What is the difference between Smishing and Spear Phishing?
Smishing is phishing through SMS, while Spear phising is a targeted phishing attack on specific individuals.
What is Whaling?
A form of spear phishing targeting high-profile individuals, like CEOs or executives
Define Watering Hole Attack
Infects websites commonly visited by a specific group to target those users.
What is Tarpitting?
Intentionally slowing down server responses to discourage spam or malicious attacks
What makes a Worm different from a Virus?
A worm self-replicates without user interaction, while a virus requires user action to spread.
What is a Fileless Virus?
Malware that runs in memory without leaving files on the disk, making it hard to detect?
How can you protect against Ransomware?
Maintain offline backups not connected to the system.
What is a Logic Bomb?
Malicious code triggered by a specific event or date
What is a Spraying Attack?
An attack using common passwords only a few times to avoid detection or lockout
What are Rainbow Tables used for?
Precomputed hash chains used to crack passwords quickly
What is a Birthday Attack?
An attack that exploits hash collisions to find two inputs with the same hash