Network Attacks (4.2) Flashcards

(47 cards)

1
Q

Denial of Service (DoS) Attack

A

o Occurs when one machine continually floods a victim with requests for services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

TCP SYN Flood

A

TCP SYN Flood
▪ Occurs when an attacker initiates multiple TCP sessions, but never
completes them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Smurf Attack (ICMP Flood)

A

▪ Occurs when an attacker sends a ping to a subnet broadcast address with
the source IP spoofed to be that of the victim server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Distributed Denial of Service (DDoS) Attack

A

▪ Occurs when an attacker uses multiple computers to ask for access to the
same server at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Botnet

A

o A collection of compromised computers under the control

of a master node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Zombie

A

o Any of the individually compromised computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

On-Path/ Man-in-the-Middle (MITM) Attack

A

▪ Occurs when an attacker puts themselves between the victim and the
intended destination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Session Hijacking

A

▪ Occurs when an attacker guesses the session ID that is in use between a
client and a server and takes over the authenticated session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DNS Poisoning

A

▪ Occurs when an attacker manipulates known vulnerabilities within the
DNS to reroute traffic from one site to a fake version of that site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

DNSSEC

A

▪ Uses encrypted digital signatures when passing DNS information between
servers to help protect it from poisoning
▪ Ensure server has the latest security patches and updates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Rogue DHCP Server

A

▪ A DHCP server on a network which is not under the administrative
control of the network administrators

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Spoofing

A

▪ Occurs when an attacker masquerades as another person by falsifying
their identity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IP Spoofing

A

▪ Modifying the source address of an IP packet to hide the identity of the
sender or impersonate another client
▪ IP spoofing is focused at Layer 3 of the OSI model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

MAC Spoofing

A

▪ Changing the MAC address to pretend the use of a different network
interface card or device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

MAC Filtering

A

▪ Relies on a list of all known and authorized MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ARP Spoofing

A

▪ Sending falsified ARP messages over a local area network
▪ ARP spoofing attack can be used as a precursor to other attacks
▪ Set up good VLAN segmentation within your network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

VLAN Hopping

A

▪ Ability to send traffic from one VLAN into another, bypassing the VLAN
segmentation you have configured within your Layer 2 networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Double Tagging

A

▪ Connecting to an interface on the switch using access mode with the
same VLAN as the native untagged VLAN on the trunk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Switch Spoofing

A

▪ Attempting to conduct a Dynamic Trunking Protocol (DTP) negotiation
▪ Disable dynamic switchport mode on your switchports

20
Q

Malware

A

▪ Designed to infiltrate a computer system and possibly damage it without
the user’s knowledge or consent

21
Q

Virus

A

▪ Made up of malicious code that is run on a machine without the user’s
knowledge and infects it whenever that code is run

22
Q

Worm

A

▪ A piece of malicious software that can replicate itself without user
interaction

23
Q

Trojan Horse

A

▪ A piece of malicious software disguised as a piece of harmless or
desirable software

24
Q

Remote Access Trojan (RAT)

A

▪ Provides the attacker with remote control of a victim machine

25
Ransomware
▪ Restricts access to a victim’s computer system or files until a ransom or payment is received
26
Spyware
▪ Gathers information about you without your consent
27
Key Logger
▪ Captures any key strokes made on the victim machine
28
Rootkit
▪ Designed to gain administrative control over a computer system or network device without being detected
29
Rogue Access Point
▪ A wireless access point that has been installed on a secure network without authorization from a local network administrator
30
Shadow IT
▪ Use of IT systems, devices, software, applications, or services without the explicit approval of the IT department
31
Evil Twin
▪ Wireless access point that uses the same name as your own network
32
Deauthentication
▪ Attempts to interrupt communication between an end user and the wireless access point
33
Dictionary Attack
▪ Guesses the password by attempting to check every single word or phrase contained within a word list, called a dictionary ▪ Do not use anything that looks like a regular word
34
Brute Force Attack
▪ Tries every possible combination until they figure out the password ▪ Use a longer and more complicated password
35
Hybrid Attack
▪ Combination of dictionary and brute force attacks
36
Wireless Interception
▪ Captures wireless data packets as they go across the airwaves
37
Wireless Interception
▪ Captures wireless data packets as they go across the airwaves
38
Social Engineering
▪ Any attempt to manipulate users to reveal confidential information or perform actions detrimental to a system’s security ▪ The weakest link is our end users and employees
39
Phishing
▪ Sending an email in an attempt to get a user to click a link ▪ Sending out emails to capture the most people and doesn’t really target any particular person or group
40
Spearphishing
▪ More targeted form of phishing
41
Whaling
▪ Focused on key executives within an organization or other key leaders, executives, and managers in the company
42
Tailgating
▪ Entering a secure portion of the organization’s building by following an authorized person into the area without their knowledge or consent
43
Piggybacking
▪ Similar to tailgating, but occurs with the employee’s knowledge or consent
44
Shoulder Surfing
▪ Coming up behind an employee and trying to use direct observation to obtain information
45
Dumpster Diving
▪ Scavenging for personal or confidential information in garbage or recycling containers
46
Insider Threat
o An employee or other trusted insider who uses their authorized network access in unauthorized ways to harm the company
47
Logic Bomb
o A specific type of malware that is tied to either a logical event or a specific time