Test 9 Flashcards
As opposed to simple DoS attacks that usually are performed from a single system, a DDoS attack uses multiple compromised computer systems to perform the attack against its target. The intermediary systems that are used as a platform for the attack (often referred to as zombies, and collectively as a botnet) are the secondary victims of the DDoS attack.
True
A type of DDoS attack where an attacker exploits vulnerabilities in certain services or protocols to generate responses that are much larger than the original request is referred to as:
Amplified DDoS attack
What defines a reflected DDoS attack?
Utilizing third-party servers to reflect and amplify attack traffic towards the target
A DNS amplification attack is a type of DDoS attack wherein an attacker sends a small, specially crafted DNS query containing a spoofed IP address (the victim’s IP) to a compromised DNS server. Upon receiving the query, the DNS server generates a much larger response packet, which is then sent to the victim’s IP address, causing potential disruption due to overwhelming traffic.
True
Which of the answers listed below refers to a cyberattack technique that relies on providing false DNS information to a DNS resolver for the purpose of redirecting or manipulating the resolution of domain names to malicious IP addresses?
DNS spoofing
Remapping a domain name to a rogue IP address is an example of what kind of exploit?
DNS cache poisoning
When domain registrants due to unlawful actions of third parties lose control over their domain names, they fall victim to:
Domain hijacking
Which of the following can be classified as malicious activity indicator on a wireless network?
Rogue AP
The practice of gaining unauthorized access to a Bluetooth device is known as:
Bluesnarfing
A wireless disassociation attack is a type of: (Select 2 answers)
Deauthentication attack
DoS attack
A wireless jamming attack is a type of:
DoS attack
Which of the answers listed below refers to RFID vulnerability?
Spoofing
Eavesdropping
RFID cloning
Data interception
Replay attack
DoS attack
Which of the following is a vulnerability characteristic to NFC communication?
Eavesdropping
Data interception
Replay attacks
DoS attacks
Which wireless attack focuses on exploiting vulnerabilities found in WEP?
IV attack
Which of the statements listed below can be used to describe the characteristics of an on-path attack? (Select all that apply)
An on-path attack is also known as MITM attack ( Missed)
Attackers place themselves on the communication route between two devices ( Missed)
Attackers intercept or modify packets sent between two communicating devices