1.4 Analyze potential indicators associated with network attacks Flashcards

(42 cards)

1
Q

Used to detect the presence of a wireless network.

A

Wireless scanner/cracker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

An attack in which a hacker operates a false access point that will automatically clone, or twin, the identity of an access point based on a client device’s request to connect.

A

Evil twin attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

May be planted by an employee for convenience, or it may be operated externally by an attacker.

A

Rogue access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The unauthorized accessing of data via a Bluetooth connection.

A

Bluesnarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Grants an attacker remote control over the hardware and software of your devices over a Bluetooth connection.

A

Bluebugging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The sending of unsolicited messages to Bluetooth capable devices without the permission of the owner/user.

A

Bluejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Eavesdropping or packet capturing Bluetooth communications.

A

Bluesniffing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A DoS attack against a Bluetooth device.

A

Bluesmacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A type of wireless management frame that can be used in wireless attacks, including discovering hidden SSIDs, causing a DoS, hijacking sessions, and on-path.

A

Disassociation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The transmission of radio signals to prevent reliable communications by decreasing the effective signal-to-noise ratio.

A

Jamming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A tracking technology based on the ability to power a radio transmitter using current generated in an antenna when placed in a magnetic field.

A

Radio frequency identification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A standard to establish radio communications between devices in close proximity. It is commonly employed for contactless payments.

A

Near field communication (NFC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A mathematical and cryptographic term for a random number.

A

Initialization vector (IV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A communications eavesdropping attack. Attackers position themselves in the communication stream between a client and server.

A

On-path attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

When the malware is operating on the victim’s system.

A

Browser on-path attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A form of attack in which malicious content is submitted to a vulnerable application, typically a web browser or web server, under the guise of a valid HTML/HTTP header value.
(

A

HTTP Header manipulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The act of falsifying the IP-to-MAC address resolution system employed by TCP/IP.

A

ARP poisoning

18
Q

Uses a flooding attack to compromise a switch so that the switch gets stuck into flooding all network communications.

19
Q

Used to impersonate another system, often a valid or authorized network device to bypass port security or MAC filtering limitation.

A

MAC cloning/spoofing

20
Q

The falsification of the source address of network packets. As a result, victims are unable to locate the true attackers or initiators of a communication. Also, the attacker may use this against the source address to redirect packet responses, replies, and echoes to some other system.

21
Q

the hierarchical naming scheme used in both public and private networks. This links human-friendly fully qualified domain names (FQDNs) and IP addresses together.

A

Domain name system (DNS)

22
Q

The malicious action of changing the registration of a domain name without the authorization of the valid owner.

A

Domain hijacking

23
Q

The act of falsifying the DNS information used by a client to reach a desired system.

A

DNS poisoning

24
Q

Is a means to make a web page available through multiple URL addresses or domain names a.k.a. URL forwarding.

A

URL redirection

25
A scoring system that can be used to determine whether your communications or your site is more likely legitimate or more likely malicious or fraudulent. Sometimes this is called a sender score, especially when it is focusing on email.
Domain reputation
26
A form of attack that has the primary goal of preventing the victimized system from performing legitimate activity or responding to legitimate traffic.
Denial of service (DoS)
27
Attacks are waged by first compromising or infiltrating one or more intermediary systems (i.e., bots) that serve as a launch points or attack platforms.
Distributed denial of service (DDoS)
28
Employs an amplification or bounce network that is an unwilling or unknowing participant that is unfortunately able to receive broadcast messages and create message responses, echoes , or bounces.
Distributed reflective denial-of-service (DRDoS)
29
This DRDoS attack uses ICMP echo reply packets (ping packets).
Smurf attack
30
This DRDoS uses UDP packets.
Fraggle attack
31
This DoS attack exploits the TCP three way handshake and results in resource exhaustion.
SYN flood
32
The attacker sends fragments to a victim that when re-assembled result in an oversized ping packet causing a buffer overflow.
Ping of death
33
Uses the Xmas scan to perform a DoS.
Xmas attack
34
A partial transmission of fragmented packets causing the target to consume system resources holding onto incomplete reassembles.
Teardrop attack
35
A SYN flood attack where the source and destination address are both said to be victims address, which causes a logical error.
Land attack
36
An attack where the amount of work or traffic generated by an attacker is multiplied to DoS the victim.
Amplification attacks
37
Administrators need to analyze and the site for the potential indicators that are associated with Netwerk attacks that may have been caused by malicious code or malicious script execution.
Malicious code or script execution
38
Both a scripting language as well as a commandline shell for Microsoft Windows. PowerShell can be used to write malicious scripts.
Powershell
39
A scripting programming language that is popular. Python can be used to write malicious scripts.
Python
40
A command shell and a scripting language. Bash can be used to write malicious scripts.
Bash
41
A program or script written in a language that is embedded into specific files. These can be a powerful tool for automating tasks, but they can also be employed for malicious purposes.
Macros
42
A powerful programming language that is built into productivity documents. It is the primary language that Office macros are written in.
Visual Basic for Applications