Which type of attack overwhelms a server with excessive traffic, making it unavailable to users?
- Denial-of-Service (DoS)
- ARP poisoning
- VLAN hopping
- Exploit
Denial-of-Service (DoS) | Practical Use: Attackers flood a website until it crashes. | Explanation: DoS and DDoS overwhelm resources, preventing legitimate access. | Objective: 4.2 – Attacks | Follow-up Question: How does a DDoS differ from a DoS?
Which attack allows traffic from one VLAN to be sent into another VLAN without authorization?
- DNS spoofing
- ARP poisoning
- VLAN hopping
- MAC flooding
VLAN hopping | Practical Use: Attackers bypass segmentation to reach sensitive VLANs. | Explanation: VLAN hopping exploits switch misconfigurations to cross VLAN boundaries. | Objective: 4.2 – Attacks | Follow-up Question: What’s one way to prevent VLAN hopping?
Which attack floods a switch with fake MAC addresses, forcing it to act like a hub?
- Evil twin
- DNS poisoning
- ARP spoofing
- MAC flooding
MAC flooding | Practical Use: Attacker intercepts all traffic when a switch fails open. | Explanation: MAC flooding overwhelms CAM tables, causing broadcast behavior. | Objective: 4.2 – Attacks | Follow-up Question: How can port security mitigate MAC flooding?
Which attack sends malicious ARP messages to link an attacker’s MAC with a legitimate IP address?
- Rogue DHCP
- ARP poisoning
- VLAN hopping
- DNS spoofing
ARP poisoning | Practical Use: Redirecting traffic intended for a server to the attacker. | Explanation: ARP poisoning allows interception or blocking of network traffic. | Objective: 4.2 – Attacks | Follow-up Question: What type of attack can ARP poisoning enable?
Which technique involves sending falsified ARP messages to impersonate another host on a LAN?
- MAC flooding
- DNS poisoning
- Rogue AP
- ARP spoofing
ARP spoofing | Practical Use: Intercepting login credentials on a LAN. | Explanation: ARP spoofing links the attacker’s MAC to a victim’s IP. | Objective: 4.2 – Attacks | Follow-up Question: How does ARP spoofing differ from ARP poisoning?
Which attack corrupts DNS cache to redirect users to malicious websites?
- VLAN hopping
- On-path attack
- DNS poisoning
- Evil twin
DNS poisoning | Practical Use: Redirecting a bank’s domain to a fake website. | Explanation: DNS poisoning changes DNS records to send users to rogue sites. | Objective: 4.2 – Attacks | Follow-up Question: How does DNS poisoning impact user trust in the internet?
Which attack alters DNS records to redirect traffic to fraudulent websites?
- MAC flooding
- DNS spoofing
- DoS
- Rogue DHCP
DNS spoofing | Practical Use: Users are redirected to a phishing page that looks like Gmail. | Explanation: DNS spoofing tricks users into giving sensitive information. | Objective: 4.2 – Attacks | Follow-up Question: How is DNS spoofing related to phishing attacks?
What is a rogue device?
- A corrupted DNS record
- A malicious firewall rule
- An unauthorized device connected to the network
- A self-signed certificate
An unauthorized device connected to the network | Practical Use: Rogue laptops or access points used by attackers. | Explanation: Rogue devices can manipulate or intercept traffic. | Objective: 4.2 – Attacks | Follow-up Question: Why are rogue DHCP servers dangerous?
Which type of rogue device gives clients incorrect IP settings to reroute traffic?
- Rogue AP
- Rogue DHCP server
- Evil twin
- VLAN hopper
Rogue DHCP server | Practical Use: Clients unknowingly route traffic through an attacker’s system. | Explanation: Rogue DHCP servers assign malicious network configurations. | Objective: 4.2 – Attacks | Follow-up Question: How can DHCP snooping defend against rogue DHCP servers?
Which rogue device pretends to be a legitimate Wi-Fi access point?
- Rogue AP
- DNS poisoning
- Evil twin
- Rogue DHCP
Rogue AP | Practical Use: Unauthorized Wi-Fi access to capture data. | Explanation: Rogue APs provide attackers access to network resources. | Objective: 4.2 – Attacks | Follow-up Question: What’s the difference between a rogue AP and an evil twin?
Which attack creates a fake Wi-Fi hotspot with the same SSID as a legitimate one?
- VLAN hopping
- DNS spoofing
- Rogue AP
- Evil twin
Evil twin | Practical Use: Tricking users to connect and leak credentials. | Explanation: Evil twins impersonate trusted Wi-Fi networks. | Objective: 4.2 – Attacks | Follow-up Question: How can end users detect an evil twin?
Which attack intercepts communication between two parties without their knowledge?
- Phishing
- On-path attack
- ARP poisoning
- VLAN hopping
On-path attack | Practical Use: Eavesdropping on sensitive emails. | Explanation: On-path attacks (MITM) allow interception and manipulation of data. | Objective: 4.2 – Attacks | Follow-up Question: How does HTTPS help prevent on-path attacks?
What type of attack manipulates people instead of technology to gain access?
- Malware
- ARP poisoning
- Social engineering
- VLAN hopping
Social engineering | Practical Use: Tricking employees to share passwords. | Explanation: Social engineering exploits human trust. | Objective: 4.2 – Attacks | Follow-up Question: Why is social engineering often more effective than technical exploits?
Which attack involves tricking users into revealing information through fake emails or messages?
- Tailgating
- Evil twin
- Dumpster diving
- Phishing
Phishing | Practical Use: Fake bank emails stealing login credentials. | Explanation: Phishing pretends to be a trusted entity. | Objective: 4.2 – Social engineering | Follow-up Question: What’s the difference between phishing and spear phishing?
Which method involves attackers searching through discarded materials to find sensitive data?
- Shoulder surfing
- Dumpster diving
- Rogue device
- Malware
Dumpster diving | Practical Use: Retrieving shredded but readable documents. | Explanation: Dumpster diving finds confidential data in trash. | Objective: 4.2 – Social engineering | Follow-up Question: What’s one mitigation against dumpster diving?
Which attack involves observing someone entering a password or PIN?
- Shoulder surfing
- Phishing
- On-path attack
- MAC flooding
Shoulder surfing | Practical Use: Looking over a shoulder at an ATM. | Explanation: Shoulder surfing directly observes credentials. | Objective: 4.2 – Social engineering | Follow-up Question: How can privacy screens reduce shoulder surfing risk?
Which attack occurs when an unauthorized person follows an employee into a secure area?
- Rogue AP
- Dumpster diving
- Tailgating
- Evil twin
Tailgating | Practical Use: Attacker slips into a data center behind an employee. | Explanation: Tailgating exploits human trust to bypass physical security. | Objective: 4.2 – Social engineering | Follow-up Question: What physical controls help prevent tailgating?
Which term describes malicious software designed to harm computers or networks?
- Malware
- Vulnerability
- Risk
- Exploit
Malware | Practical Use: Ransomware encrypting company files for payment. | Explanation: Malware includes viruses, worms, trojans, ransomware, spyware, and adware. | Objective: 4.2 – Attacks | Follow-up Question: What’s one difference between a virus and a worm?