Network attacks 4.2 Flashcards

(17 cards)

1
Q

Denial of Service

A

Overload service. Could be unintentional or a network issue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Distributed denial of service

A

Denial of service with botnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Vlan Hopping

A

Switching between different Vlans through switch spoofing or double tagging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Switch spoofing

A

Pretending to be a switch to make a trunk connection and allowing a way into other vlans. Vulnerability with trunk negotiations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Double tagging

A

Packet has two vlan tags which goes through one vlan, gets the tag removed, and goes to another. One-way, no info out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

MAC flooding

A

Flood the limited MAC address table with many MAC addresses, forcing legitimate MAC addresses out and making traffic transmitted to all interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Spoofing

A

Faking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

ARP poisoning

A

IP Spoofing. Attacker intercepts ARP request and slips in their own device. Man in the middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

DNS poisoning

A

DNS request spoofing. Similar to ARP poisoning but with DNS. Man in the middle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Rogue DHCP server

A

DHCP isn’t inherently secure so an unauthorized server can assign IP addresses. Can be fixed with authorized DHCP servers and enabling DHCP snooping. Remove rogue server and renew IP leases

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Rogue AP

A

Unauthorized wireless access point. Potential weak entry point. Find with network scans and consider using network access control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Wireless evil twin

A

SSID spoofing to try to capture wifi hotspot users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Social engineering

A

Fooling users into giving information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Shoulder surfing

A

Someone else looking at your screen while you’re unaware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Tailgating/piggybacking

A

Using someone else’s entry, like getting in when someone else unlocks and opens a door

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Dumpster diving

A

Trash may have valuable information. Should be shredded

17
Q

Malware

A

Malicious software