Common Attack Types Quiz Flashcards

1
Q

What is the purpose of a DoS (Denial of Service) attack?

A

Resource Exhaustion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

As opposed to the simple DoS attacks that usually are performed from a single system, a Distributed Denial of Service (DDoS( attack uses multiple compromised computer systems to perform the attack against its target.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following applies to a collection of intermediary compromised systems that can be used as a platform for a DDoS attack?

A

Botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the function of a C2 Server? (Command and Control Server)

A

Botnet Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following statements can be used to describe the characteristics of an on-path attack? (Select all that apply)

A

An on-path attack is also known as MITM (Man in the Middle)
In an on-path attack, attackers place themselves on the communications route between two devices
In an on-path attack, attackers intercept or modify packets sent between two communicating devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Remapping a domain name to a rogue IP address is an example of what kind of exploit?

A

DNS Poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Switch spoofing and double tagging are attack methods used in:

A

VLAN hopping attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

An attacker managed to associate his/her MAC address with the IP address of the default gateway. In result, a targeted host is sending network traffic to the attacker’s IP address instead of the IP address of the default gateway. Based on the given information, which type of attack is taking place in the this scenario?

A

ARP (Address Resolution Protocol) poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The term “DHCP snooping” refers to an exploit that enables operation of a rogue DHCP network server.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The term “Evil twin” refers to a rogue Wireless Access Point (WAP) set up for the purpose of eavesdropping or stealing sensitive user data. Evil twin replaced the legitimate access point and by advertising its its presence with the same Service Set Identifier (SSID) appears as a legitimate access point to connecting hosts.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Malware that restricts access to a computer system by encrypting files or locking the entire down until the user performs requested action is known as:

A

Ransomeware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

An attack against encrypted data relies heavily on computing power to check all possible keys and passwords until the correct one is found is known as:

A

Brute-force attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which password attack takes advantage of a predefined list of words?

A

Dictionary attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

An attack that relies on altering the burned-in address of a NIC to assume the identity of a different network host is known as: (Select 2 answers)

A

MAC spoofing
MAC cloning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following attacks relies on altering the source layer 3 address

A

IP spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A wireless disassociation attack is a type of? (Select 2 answers)

A

Deauthentication attack
Denial-of-Service attack

17
Q

Harmful programs used to disrupt computers operation, gather sensitive information, or gain unauthorized access to computer systems are commonly referred to as:

A

Malware

18
Q

A social engineering technique whereby attackers under disguise of a legitimate request attempt to gain access to confidential information is commonly referred to as:

A

Phishing

19
Q

What is tailgating?

A

Gaining unauthorized access to restricted areas by following another person (without the consent of the authorized person)

20
Q

What is piggybacking?

A

Gaining unauthorized access to restricted areas by following another person (with the consent of the authorized person)

21
Q

A situation in which an unauthorized person can view another user’s display of keyboard to learn their password or other confidential information is referred to as:

A

Shoulder surfing