1.4 Flashcards

Given a scenario, analyze potential indicators associated with network attacks.

1
Q

Is a common networking technology that has a substantial number of standards and processes to connect users to networks via a radio signal, thus freeing machines from wires.

A

Wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

type of wireless network attack where a malicious actor sets up a rogue Wi-Fi hotspot with a name identical or similar to a legitimate network.

A

Evil twin attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Is an unauthorized and typically malicious wireless access point (AP) that is connected to a network without the knowledge or approval of the network administrator.

A

Rogue access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The unauthorized access and theft of information from a Bluetooth-enabled device, such as a mobile phone or laptop, often exploiting vulnerabilities to gain access to personal data without the user’s knowledge or consent.

A

Bluesnarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The act of sending unsolicited messages or data to nearby Bluetooth-enabled devices, such as mobile phones or laptops, without gaining unauthorized access to the device.

A

Bluejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The intentional termination of a connection between a client device and a wireless network.

A

Disassociation attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Is a form of denial of service (DoS) that specifically targets the radio spectrum aspect of wireless.

A

Jamming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A technology that uses wireless communication to identify and track objects or individuals through small electronic tags (RFID tags) .

A

Radio frequency identification (RFID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Is a set of wireless technologies that enables smartphones and other devices to establish radio communications over a short distance.

A

Near-field communication (NFC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Is used in wireless systems as the randomization element at the beginning of a connection. Attacks against it are aimed at determining the IV, thus finding the repeating key sequence.

A

Initialization vector (IV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A type of network attack where the malicious actor positions themselves on the communication path between two entities, such as a client and a server. This allows the attacker to intercept, modify, or manipulate the communication between the two parties.

A

On-path attack (previously
known as man-in-the-middle attack/
man-in-the-browser attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Type of attacks that target the data link layer of the OSI model, focusing on vulnerabilities in network devices like switches and bridges.

A

Layer 2 attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Involves manipulating the ARP cache of a network to associate a fake Media Access Control (MAC) address with a legitimate IP address.

A

Address Resolution
Protocol (ARP) poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Is the act of changing a MAC address to bypass security checks based on the MAC address.

A

MAC cloning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Is a type of attack where an attacker floods the network switch with a large number of fake or random MAC addresses.

A

Media access control (MAC) flooding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Is a decentralized system that translates human-readable domain names into IP addresses.

A

Domain name system (DNS)

17
Q

Is the act of changing the registration of a domain name without the permission of its original registrant.

A

Domain hijacking

18
Q

A type of attack where false or malicious information is introduced into the Domain Name System (DNS) cache. This can lead to the redirection of domain name resolutions, causing users to be directed to fraudulent websites.

A

DNS poisoning

19
Q

Is the method of describing where you want a browser to go, and it is the main interface to the DNS process that converts it to a machine-readable address.

A

Uniform Resource
Locator (URL) redirection

20
Q

The evaluation of a domain’s trustworthiness and legitimacy based on its historical behavior, security practices, and online activities.

A

Domain reputation

21
Q

A DoS attack employing multiple attacking systems.

A

Distributed denial-of-service (DDoS)

22
Q

Is a collection of compromised computers or devices, often forming a botnet, coordinated to flood a target system or network with a massive volume of traffic.

A

Distributed denial-of-service (DDoS): Network

23
Q

A type of DDoS attack that aims to exhaust the resources of a targeted application or service.

A

Application-level DDoS attack

24
Q

Is the name given to networks of industrial devices in cyber-physical systems.

A

Operational technology (OT)

25
Q

The use of scripts and automation to maliciously impact a system.

A

Malicious code and script execution

26
Q

A built-in command-line tool suite that has a rich set of Microsoft Windows commands.

A

PowerShell

27
Q

Is a widely used programming language/scripting language.

A

Python

28
Q

(aka Bourne Again Shell) is an interpreter that processes shell commands on Linux systems.

A

Bash

29
Q

Are recorded sets of instructions, typically presented to an application to automate their function.

A

Macros

30
Q

Is an older technology from Microsoft that was used to automate many internal processes in applications.

A

Visual Basic for Applications (VBA)