Types of attacks Flashcards

1
Q

What is a Denial-of-Service (DoS) attack?

A

Denial-of-Service (DoS) attack: Overwhelming a system with traffic to make it unavailable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a Distributed Denial-of-Service (DDoS) attack?

A

Distributed Denial-of-Service (DDoS) attack: Using multiple systems to overwhelm a target with traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a botnet?

A

Botnet: A network of infected computers controlled by an attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is command and control in cybersecurity?

A

Command and control: A server or infrastructure used to control a botnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an on-path attack (previously known as man-in-the-middle attack)?

A

On-path attack (man-in-the-middle attack): Intercepting and altering communication between two parties.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is DNS poisoning?

A

DNS poisoning: Corrupting DNS data to redirect traffic to malicious sites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is VLAN hopping?

A

VLAN hopping: Gaining unauthorized access to a VLAN by exploiting switch configuration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is ARP spoofing?

A

ARP spoofing: Sending false ARP messages to associate an attacker?s MAC address with the IP address of a legitimate device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a rogue DHCP server?

A

Rogue DHCP server: Unauthorized DHCP server providing incorrect IP configurations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a rogue access point (AP)?

A

Rogue access point (AP): Unauthorized wireless access point set up by an attacker.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is an evil twin attack?

A

Evil twin attack: Setting up a fake wireless access point to intercept data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is ransomware?

A

Ransomware: Malware that encrypts files and demands payment for decryption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are password attacks?

A

Password attacks: Attempts to obtain or decrypt passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a brute-force attack?

A

Brute-force attack: Trying all possible password combinations to gain access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a dictionary attack?

A

Dictionary attack: Using a list of common passwords to attempt to gain access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is MAC spoofing?

A

MAC spoofing: Changing a device?s MAC address to impersonate another device.

17
Q

What is IP spoofing?

A

IP spoofing: Sending packets with a false IP address to hide the sender’s identity.

18
Q

What is a deauthentication attack?

A

Deauthentication attack: Forcing a device to disconnect from a network.

19
Q

What is malware?

A

Malware: Malicious software designed to harm or exploit systems.

20
Q

What is social engineering?

A

Social engineering: Manipulating people to divulge confidential information.

21
Q

What is phishing?

A

Phishing: Fraudulent attempts to obtain sensitive information by pretending to be a trustworthy entity.

22
Q

What is tailgating?

A

Tailgating: Gaining unauthorized access to a secure area by following someone with proper access.

23
Q

What is piggybacking?

A

Piggybacking: Similar to tailgating, but with the knowledge and consent of the person being followed.

24
Q

What is shoulder surfing?

A

Shoulder surfing: Watching someone enter sensitive information, such as a PIN or password.