Network Threats and Attacks Flashcards

1
Q

Malicious software includes viruses, worms, Trojans, ransomware, and spyware that can infect systems, steal data, or disrupt operations.

A

Malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A fraudulent attempt to obtain sensitive information (such as usernames, passwords, and financial details) by impersonating a trusted entity via email or other communication channels.

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Overwhelm a network or website with excessive traffic or requests, causing it to become unavailable.

A

Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

An attacker intercepts and possibly alters communication between two parties without their knowledge.

A

Man-in-the-Middle (MitM) Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Attackers insert malicious SQL queries into input fields to manipulate a database, potentially gaining unauthorized access to data.

A

SQL Injection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Injecting malicious scripts into web pages viewed by other users, compromising their browsing experience or stealing their data.

A

Cross-Site Scripting (XSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Attacks that target vulnerabilities in software or hardware that are not yet known to the vendor or public, giving no time for patches.

A

Zero-Day Exploits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Includes brute force attacks, dictionary attacks, and credential stuffing, aiming to gain unauthorized access by exploiting weak or stolen passwords.

A

Password Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Malicious or negligent actions by employees or trusted individuals within an organization that can compromise security.

A

Insider Threats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Unauthorized devices (e.g., rogue access points) added to a network that can be used to eavesdrop or gain access.

A

Rogue Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Unauthorized interception of network traffic to capture sensitive data.

A

Eavesdropping/Sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Manipulating individuals into divulging confidential information or performing actions that compromise security.

A

Social Engineering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Malicious advertisements that can infect systems when clicked on.

A

Malvertising

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Internet of Things devices with security weaknesses that can be exploited by attackers.

A

IoT Vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Malicious software is automatically downloaded and installed when a user visits a compromised website.

A

Drive-By Downloads

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Unauthorized copying, transfer, or retrieval of data from an organization’s network.

A

Data Exfiltration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Intercepting and analyzing data packets in transit to obtain sensitive information.

A

Packet Sniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Manipulating DNS records to redirect users to malicious websites or hijack their traffic.

A

DNS Spoofing/Cache Poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Repeatedly trying all possible combinations of passwords or encryption keys until the correct one is found.

A

Brute Force Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Scanning for and exploiting vulnerabilities in wireless networks.

A

Wardriving

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Illegally using a victim’s computer or network resources to mine cryptocurrency.

A

Cryptojacking

22
Q

Exploiting vulnerabilities in applications or scripts without writing malicious files to disk, making them harder to detect.

A

Fileless Attacks

23
Q

Long-term targeted attacks by well-funded and organized adversaries with the goal of stealing information or maintaining a persistent presence.

A

Advanced Persistent Threats (APTs)

24
Q

Attackers compromise websites frequently visited by their target audience, infecting visitors with malware.

A

Watering Hole Attacks

25
Q

Encrypting a victim’s data and demanding a ransom for decryption keys.

A

Ransomware

26
Q

Illegally acquiring usernames and passwords through various means, such as keyloggers or phishing, to gain unauthorized access.

A

Credential Theft

27
Q

Also known as session fixation, attackers take control of a user’s active session to impersonate them and perform malicious actions.

A

Session Hijacking

28
Q

Attackers use DNS queries to create covert communication channels for data exfiltration or command and control.

A

DNS Tunneling

29
Q

Malicious software that permanently damages or “bricks” a device, rendering it unusable.

A

BrickerBot (Permanent Denial-of-Service)

30
Q

Hijacking a network of compromised devices to mine cryptocurrencies, consuming resources and slowing down systems.

A

Crypto-Mining Botnets

31
Q

Exploiting insecure file upload functionality to execute malicious scripts or upload malware.

A

File Upload Vulnerabilities

32
Q

Manipulating the Address Resolution Protocol to associate an attacker’s MAC address with a legitimate IP address.

A

ARP Spoofing/Poisoning

33
Q

Malware or malicious code introduced to a network through infected USB drives or devices.

A

USB-based Attacks

34
Q

Impersonating high-level executives to trick employees into transferring money or sensitive information.

A

Business Email Compromise (BEC)

35
Q

Cybercriminals can subscribe to ransomware services, making it easier for less technically skilled attackers to launch attacks.

A

Crypto Ransomware-as-a-Service (RaaS)

36
Q

Redirecting website traffic to a fraudulent site using DNS manipulation or malware.

A

Pharming

37
Q

Scammers use phone calls or VoIP to impersonate trusted entities and obtain sensitive information.

A

Vishing (Voice Phishing)

38
Q

Fake systems or networks designed to attract attackers and study their tactics, techniques, and procedures.

A

Honeypots

39
Q

Hidden or undocumented methods for accessing a system or application, often created by attackers for future access.

A

Backdoors

40
Q

Malware targeting vulnerable Internet of Things devices to use them for malicious purposes.

A

Crypto-Malware Attacks on IoT Devices

41
Q

Attackers leverage social media platforms to spread malware, conduct phishing, or gather information about targets.

A

Social Media Attacks

42
Q

Unauthorized alteration or modification of data, which can lead to misinformation and financial or reputational damage.

A

Data Manipulation

43
Q

Techniques used by malware to generate random domain names for command and control servers to evade detection.

A

Domain Generation Algorithms (DGA)

44
Q

Compromised IoT devices are used to form botnets for various malicious activities.

A

IoT Botnets

45
Q

Exploiting vulnerabilities in application programming interfaces (APIs) to gain unauthorized access or cause disruptions.

A

API Attacks

46
Q

Attackers target vulnerabilities in the Domain Name System Security Extensions (DNSSEC) to compromise DNS integrity.

A

DNSSEC Exploitation

47
Q

Vulnerabilities in Bluetooth connections can be exploited for unauthorized access or data theft.

A

Bluetooth Attacks

48
Q

Manipulating a router’s DNS settings through vulnerabilities in the router’s firmware.

A

Drive-By Pharming

49
Q

Attackers compromise a product or service at the source, often through a third-party supplier, to distribute malware or compromise security.

A

Supply Chain Attacks

50
Q

Concealing malicious code or data within seemingly harmless files or images to evade detection.

A

Steganography