Section 4.2 Flashcards

1
Q

Describe Denial of Service attacks

A

It’s when a malicious actor overwhelms a network or service to make it unavailable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is ARP poisoning/spoofing?

A

when an on-path attacker sends an ARP response to the host and changes the host’s local ARP cache with a spoofed MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is DNS poisoning?

A

modification of DNS records to redirect to malicious websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why would a malicious actor want to use spoofed credentials?

A

to avoid detection and gain access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What can be spoofed on a network?

A

IP address, DNS, ARP, MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are commonly spoofed for social engineering?

A

Email addresses, phone numbers, voice, video

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Why is it bad to store passwords in plain text?

A

Because if an attacker acquires the file, they’ll have access to all the passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How should passwords be stored?

A

hashed and salted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a brute force attack?

A

When a malicious actor uses a trial and error process to figure out the password.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What technique is used to execute VLAN Hopping?

A

by double-tagging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How can you detect and block rogue DHCP communication?

A

by enabling DHCP snooping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an Evil Twin?

A

an access point made to look like a legitimate one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How is an Evil Twin different from a Rogue Access Point?

A

Evil Twin is intentionally malicious
Rogue Access Points are unauthorized and can be accidental

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a Deauthentication attack?

A

a wireless attack that sends fake deauthentication packets to devices to disconnect them from an AP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What’s the difference between Tailgating and Piggybacking?

A

Tailgating: authorized person is unaware
Piggybacking: authorized person is aware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How can shoulder surfing be prevented?

A

by using Privacy Filters