Network Threats and Attacks Flashcards

1
Q

_______________ are sophisticated and targeted cyberattacks where a threat actor gains unauthorized access to a network or system and remains undetected for an extended period. These attackers often have specific objectives, such as stealing sensitive data or conducting espionage.

A

Advanced Persistent Threats (APTs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_______________ involve exploiting vulnerabilities in APIs to gain unauthorized access or manipulate data. Attackers can use these vulnerabilities to compromise the functionality and security of applications and services.

A

API (Application Programming Interface) Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

_______________ attacks involve manipulating ARP tables to associate a legitimate IP address with a malicious MAC address. This can lead to network traffic being redirected to an attacker-controlled device.

A

ARP (Address Resolution Protocol) Spoofing & Poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Backdoors are hidden or unauthorized access points in a system or application that allow an attacker to bypass normal authentication and gain control over the system. They are often used for remote access and persistence.

A

Backdoors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

_______________ is a wireless technology used for short-range communication between devices. Bluetooth attacks involve exploiting vulnerabilities in Bluetooth connections to gain unauthorized access or control over connected devices.

A

Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_______________ involve systematically trying every possible combination of passwords or encryption keys until the correct one is found. These attacks are time-consuming but can be effective if passwords are weak.

A

Brute Force Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

_______________ attacks involve impersonating a trusted individual or organization via email to manipulate employees into disclosing sensitive information or conducting fraudulent financial transactions.

A

Business Email Compromise (BEC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This refers to security measures and practices aimed at protecting user credentials (e.g., usernames and passwords) from being stolen by attackers.

A

Credential Theft Prevention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

_______________ is a web application vulnerability where malicious scripts are injected into web pages viewed by other users. These scripts can steal data or perform actions on behalf of the victim.

A

Cross-Site Scripting (XSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_______________ is a criminal service where ransomware tools are offered as a service, enabling individuals with limited technical skills to launch ransomware attacks for financial gain.

A

Crypto Ransomware-as-a-Service (RaaS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

_______________ is the unauthorized use of a victim’s computer or device to mine cryptocurrency. Attackers use malware or scripts to exploit the victim’s computing resources.

A

CryptoJacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

_______________ is malicious software that encrypts a victim’s files and demands a ransom for decryption. Victims are typically forced to pay to regain access to their data.

A

Crypto-Malware Attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Botnets are networks of compromised devices controlled by an attacker._______________ are used to collectively mine cryptocurrency using the computing power of the compromised devices.

A

Crypto-Mining Botnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

_______________ involves unauthorized changes to data stored on systems or databases. Attackers may alter, delete, or corrupt data to achieve their objectives.

A

Data Manipulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

_______________ attacks manipulate the Domain Name System (DNS) to redirect users to malicious websites or intercept their communications.

A

DNS Spoofing & Cache Poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

DNS tunneling is a technique that uses DNS queries and responses to bypass network security controls and exfiltrate data.

A

DNS Tunneling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

_______________ involves attacking the security extensions of DNS to compromise the integrity and authenticity of DNS data.

A

DNSSEC (Domain Name System Security Extensions) Exploitation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

_______________ are algorithms used by malware to generate a large number of domain names dynamically. Attackers use DGAs to evade detection and establish communication with command and control servers.

A

Domain Generation Algorithms (DGA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

_______________) attacks overload a target system or network with traffic, rendering it unavailable to legitimate users.

A

DoS & DDoS: Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

_______________ occur when malware is automatically downloaded and installed on a user’s device when they visit a malicious website or interact with malicious content.

A

Drive-By Downloads

21
Q

_______________ is a type of attack where a user’s router settings are maliciously modified when they visit a compromised website, redirecting their traffic to attacker-controlled servers.

A

Drive-By Pharming

22
Q

_______________ involves intercepting and listening to communications without authorization. _______________ refers to capturing and analyzing network traffic to gain information or exploit vulnerabilities.

A

Eavesdropping, Sniffling

23
Q

_______________ in web applications allow attackers to upload malicious files, which can lead to remote code execution or other attacks.

A

File Upload Vulnerabilities

24
Q

_______________ operate in memory without leaving traces on disk. They leverage existing system tools and processes to carry out malicious activities.

A

Fileless Attacks

25
_______________ are decoy systems or networks set up to attract and trap attackers. They help organizations gather information about attack techniques and the attacker's motives.
Honeypots
26
_______________ involve individuals within an organization who misuse their access privileges to intentionally or unintentionally harm the organization's security.
Insider Threats
27
_______________ are networks of compromised IoT devices used to launch attacks, such as DDoS attacks, against targets.
IoT (Internet of Things) Botnets
28
_______________ are security weaknesses in Internet of Things devices and networks that can be exploited by attackers to gain control or access sensitive data.
IoT Vulnerabilities
29
_______________ is the use of malicious advertisements to deliver malware to a user's device when they click on or interact with the ad.
Malvertising
30
_______________, short for malicious software, encompasses various types of software designed to harm, compromise, or steal data from computer systems.
Malware
31
_______________ Attacks involve intercepting and manipulating communications between two parties without their knowledge. Attackers can eavesdrop, modify, or impersonate either party.
Man-in-the-Middle (MitM)
32
_______________ is the capture and analysis of network traffic to intercept sensitive data, such as passwords or confidential information.
Packet Sniffing
33
_______________ involve attempting to crack or guess passwords through methods like brute force, dictionary attacks, or credential stuffing.
Password Attacks
34
_______________ attacks aim to permanently damage or "brick" a device or system by overloading it with malicious actions or commands.
Permanent Denial-of-Service (PDoS)
35
_______________ measures protect against attacks that manipulate DNS or network settings to redirect users to fake websites.
Pharming Prevention
36
_______________ involves implementing security measures to prevent phishing attacks, where attackers trick individuals into revealing sensitive information or performing actions they shouldn't.
Phishing Protection
37
_______________ is malicious software that encrypts a victim's files and demands a ransom for decryption.
Ransomware
38
_______________ are unauthorized or unmanaged devices connected to a network, posing security risks and potential entry points for attackers.
Rogue Devices
39
_______________ occurs when an attacker takes over an active user session to gain unauthorized access to a system or application.
Session Hijacking
40
_______________ is a manipulation technique where attackers deceive individuals into revealing confidential information or performing actions that compromise security.
Social Engineering
41
_______________ target individuals or organizations on social media platforms, often involving account compromise, impersonation, or spreading of malicious content.
Social Media Attacks
42
_______________ is a web application vulnerability that allows attackers to execute arbitrary SQL queries on a database, potentially gaining unauthorized access or manipulating data.
SQL Injection
43
_______________ is the practice of hiding information within digital files, such as images or audio, to conceal it from detection.
Steganography
44
_______________ involve targeting an organization by compromising its suppliers or partners, with the goal of infiltrating the target organization through trusted connections.
Supply Chain Attacks
45
_______________ attacks exploit vulnerabilities in USB devices to compromise a computer or network when a malicious USB device is connected.
USB-based
46
_______________ is a type of phishing attack conducted over voice calls, where attackers impersonate trusted entities to deceive individuals into revealing sensitive information.
Vishing (Voice Phishing)
47
_______________wireless networks, often for malicious purposes, such as unauthorized network access or data interception.
Wardriving
48
_______________ attacks target websites or online locations frequently visited by a target group, infecting these sites to compromise the users who visit them.
Watering Hole
49
_______________ are attacks that target vulnerabilities in software or systems that are not yet known to the vendor or have not been patched. They are called "zero-day" because there are zero days of protection against them when they are discovered.
Zero-Day Exploits