1.4 Given a scenario, analyze potential indicators associated with network attacks Flashcards

1
Q

What is Wireless?

A

Wireless refers to the transmission of data over radio waves without the need for physical cables or connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What term describes the transmission of data over radio waves without physical connections?

A

Wireless

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is an Evil twin?

A

An Evil twin is a rogue wireless access point that masquerades as a legitimate Wi-Fi network to intercept data or deceive users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What term describes a rogue wireless access point that impersonates a legitimate network?

A

Evil twin

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a Rogue access point?

A

A Rogue access point is an unauthorized wireless access point that has been installed on a network without explicit authorization from the network administrator.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What term describes an unauthorized wireless access point installed without authorization?

A

Rogue access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Bluesnarfing?

A

Bluesnarfing is the unauthorized access of information from a wireless device through a Bluetooth connection, often without the user’s knowledge or consent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What term describes the unauthorized access of information from a wireless device through Bluetooth?

A

Bluesnarfing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is Bluejacking?

A

Bluejacking is the unauthorized sending of unsolicited messages or spam to Bluetooth-enabled devices, often for the purpose of advertising or harassment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What term describes the unauthorized sending of unsolicited messages to Bluetooth-enabled devices?

A

Bluejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Disassociation?

A

Disassociation is the deliberate termination of a Wi-Fi connection between a wireless device and an access point, often used as a method of attack to disrupt connectivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What term describes the deliberate termination of a Wi-Fi connection between a device and an access point?

A

Disassociation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is Jamming?

A

Jamming is the interference with wireless signals, typically through the transmission of noise or radio frequency interference, to disrupt communication or block signals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What term describes the interference with wireless signals to disrupt communication or block signals?

A

Jamming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is Radio frequency identification (RFID)?

A

Radio frequency identification (RFID) is a technology that uses radio waves to identify and track objects, often used in inventory management, access control, or payment systems.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What term describes the technology that uses radio waves to identify and track objects?

A

Radio frequency identification (RFID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Nearfield communication (NFC)?

A

Nearfield communication (NFC) is a short-range wireless technology that allows for contactless communication between devices, commonly used in mobile payment systems and access control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What term describes the short-range wireless technology that allows for contactless communication between devices?

A

Nearfield communication (NFC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is an Initialization vector (IV)?

A

An Initialization vector (IV) is a random or semi-random value used in encryption algorithms to ensure unique ciphertexts, preventing patterns or repetition in encrypted data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What term describes a value used in encryption algorithms to ensure unique ciphertexts?

A

Initialization vector (IV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is an On-path attack?

A

An On-path attack, previously known as a man-in-the-middle attack or man-in-the-browser attack, is a type of cyber attack where the attacker intercepts and manipulates communication between two parties without their knowledge.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What term describes a cyber attack where the attacker intercepts and manipulates communication between two parties without their knowledge?

A

On-path attack (previously known as man-in-the-middle attack/ man-in-the-browser attack)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are Layer 2 attacks?

A

Layer 2 attacks are network attacks that target the data link layer of the OSI model, exploiting vulnerabilities in protocols such as Ethernet or Wi-Fi to intercept, manipulate, or disrupt network traffic.

24
Q

What term describes network attacks targeting the data link layer of the OSI model?

A

Layer 2 attacks

25
Q

What is Address Resolution Protocol (ARP) poisoning?

A

Address Resolution Protocol (ARP) poisoning is a network attack where the attacker sends falsified ARP messages to associate the attacker’s MAC address with the IP address of another network device, redirecting traffic or facilitating eavesdropping.

26
Q

What term describes a network attack where falsified ARP messages are used to associate the attacker’s MAC address with the IP address of another device?

A

Address Resolution Protocol (ARP) poisoning

27
Q

What is MAC flooding?

A

MAC flooding is a network attack where the attacker floods the switch’s MAC address table with fake MAC addresses, causing the switch to enter into fail-open mode and forward traffic to all ports, facilitating eavesdropping or network disruption.

28
Q

What term describes a network attack where the switch’s MAC address table is flooded with fake MAC addresses?

A

Media access control (MAC) flooding

29
Q

What is MAC cloning?

A

MAC cloning is the process of mimicking or spoofing the MAC address of another device, often used to bypass network access controls or impersonate legitimate devices.

30
Q

What term describes the process of mimicking the MAC address of another device?

A

MAC cloning

31
Q

What is the Domain name system (DNS)?

A

The Domain Name System (DNS) is a hierarchical decentralized naming system for computers, services, or any resource connected to the Internet or a private network, translating domain names into IP addresses.

32
Q

What term describes the hierarchical decentralized naming system for computers connected to the Internet?

A

Domain name system (DNS)

33
Q

What is Domain hijacking?

A

Domain hijacking is the unauthorized transfer of a domain name registration to another person or entity without the domain owner’s consent, often resulting in loss of control over the domain.

34
Q

What term describes the unauthorized transfer of a domain name registration?

A

Domain hijacking

35
Q

What is DNS poisoning?

A

DNS poisoning is a type of cyber attack where the attacker corrupts or falsifies DNS data to redirect DNS queries to malicious websites, intercept communications, or perform phishing attacks.

36
Q

What term describes the corruption or falsification of DNS data to redirect DNS queries?

A

DNS poisoning

37
Q

What is URL redirection?

A

URL redirection is a technique used to redirect website visitors from one URL to another, often used for legitimate purposes such as website maintenance or updating links.

38
Q

What term describes the technique used to redirect website visitors from one URL to another?

A

URL redirection

39
Q

What is Distributed denial-of-service (DDoS): Network?

A

Distributed denial-of-service (DDoS): Network attacks flood a network with excessive traffic, overwhelming its capacity and causing disruption or downtime.

40
Q

What term describes attacks that flood a network with excessive traffic, causing disruption or downtime?

A

Distributed denial-of-service (DDoS): Network

41
Q

What is Distributed denial-of-service (DDoS): Application?

A

Distributed denial-of-service (DDoS): Application attacks target specific applications or services, overwhelming them with malicious traffic and causing service disruption.

42
Q

What term describes attacks that target specific applications or services, causing service disruption?

A

Distributed denial-of-service (DDoS): Application

43
Q

What is Distributed denial-of-service (DDoS): Operational technology (OT)?

A

Distributed denial-of-service (DDoS): Operational technology (OT) attacks target industrial control systems, disrupting critical infrastructure and operations.

44
Q

What term describes attacks that target industrial control systems, disrupting critical infrastructure and operations?

A

Distributed denial-of-service (DDoS): Operational technology (OT)

45
Q

What is Malicious code or script execution?

A

Malicious code or script execution refers to the running of unauthorized code or scripts on a system, often with the intent of compromising security, stealing data, or causing damage.

46
Q

What term describes the running of unauthorized code or scripts on a system?

A

Malicious code or script execution

47
Q

What is PowerShell?

A

PowerShell is a command-line shell and scripting language developed by Microsoft, often used for task automation and configuration management in Windows environments.

48
Q

What term describes the command-line shell and scripting language developed by Microsoft?

A

PowerShell

49
Q

What is Python?

A

Python is a high-level programming language known for its simplicity and versatility, commonly used for web development, data analysis, and automation tasks.

50
Q

What term describes the high-level programming language known for its simplicity and versatility?

A

Python

51
Q

What is Bash?

A

Bash, short for Bourne Again Shell, is a command-line shell and scripting language primarily used in Unix-like operating systems for system administration tasks and automation.

52
Q

What term describes the command-line shell and scripting language primarily used in Unix-like operating systems?

A

Bash

53
Q

What are Macros?

A

Macros are sequences of instructions or commands that are recorded and stored for automated execution, often used in productivity software such as Microsoft Office applications.

54
Q

What term describes sequences of instructions recorded and stored for automated execution?

A

Macros

55
Q

What is Visual Basic for Applications (VBA)?

A

Visual Basic for Applications (VBA) is a programming language developed by Microsoft for creating macros and automating tasks within software applications like Microsoft Office.

56
Q

What term describes the programming language developed by Microsoft for creating macros and automating tasks?

A

Visual Basic for Applications (VBA)