Network Attacks Flashcards

1
Q

Denial of Service (DoS) Attack

A

Occurs when one machine continually floods a victim with requests for services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Smurf Attack (ICMP Flood)

A

Occurs when an attacker sends a ping to a subnet broadcast address with the source IP spoofed to be that of the victom server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Distributed DDos

A

Occurs when an attacker uses multiple computers to overload a server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

On-path/Man in the middle attack

A

Occurs when an attacker puts themselves between the victim and the intended destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Session Hijacking

A

Takes over the session completely; exploits session ids

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DNS Poisoning

A

Occurs when an attacker manipulates known vulnerabilities within the DNS to reroute traffic from one site to a fake version of that site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Rogue DHCP Server

A

any DHCP server you don’t have control over that’s on your network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Spoofing

A

pretending to be someone else; change your IP to someone else’s etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

VLAN Hopping

A

Ability to send traffic from one VLAN into another, bypassing the VLAN segmentation you have configured within your Layer 2 Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Malware

A

malicious software; damages systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Virus

A

malicious code run on a machine without the user’s knowledge

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Worms

A

a piece of mal software that can replicate itself without any action by the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Trojan Horse

A

a piece of malicious software disguising as a piece of harmless software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Spyware

A

Gathers information about you

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Key Logger

A

captures any key strokes made on the victim machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Rootkit

A

Designed to gain admin control over a computer system

17
Q

Rogue Access Point

A

A wireless access point that has been installed on a secure network without authorization from a local network administrator

18
Q

Deauthentication Attack

A

Attempts to interrupt communication between and end user and the wireless access point

19
Q

Logic Bomb

A

A specific type of malware that is tied to either a logical event or a specific time