Objective 4.2 Flashcards

(18 cards)

1
Q

Which type of attack overwhelms a server with excessive traffic, making it unavailable to users?
- Denial-of-Service (DoS)
- ARP poisoning
- VLAN hopping
- Exploit

A

Denial-of-Service (DoS) | Practical Use: Attackers flood a website until it crashes. | Explanation: DoS and DDoS overwhelm resources, preventing legitimate access. | Objective: 4.2 – Attacks | Follow-up Question: How does a DDoS differ from a DoS?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which attack allows traffic from one VLAN to be sent into another VLAN without authorization?
- DNS spoofing
- ARP poisoning
- VLAN hopping
- MAC flooding

A

VLAN hopping | Practical Use: Attackers bypass segmentation to reach sensitive VLANs. | Explanation: VLAN hopping exploits switch misconfigurations to cross VLAN boundaries. | Objective: 4.2 – Attacks | Follow-up Question: What’s one way to prevent VLAN hopping?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which attack floods a switch with fake MAC addresses, forcing it to act like a hub?
- Evil twin
- DNS poisoning
- ARP spoofing
- MAC flooding

A

MAC flooding | Practical Use: Attacker intercepts all traffic when a switch fails open. | Explanation: MAC flooding overwhelms CAM tables, causing broadcast behavior. | Objective: 4.2 – Attacks | Follow-up Question: How can port security mitigate MAC flooding?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which attack sends malicious ARP messages to link an attacker’s MAC with a legitimate IP address?
- Rogue DHCP
- ARP poisoning
- VLAN hopping
- DNS spoofing

A

ARP poisoning | Practical Use: Redirecting traffic intended for a server to the attacker. | Explanation: ARP poisoning allows interception or blocking of network traffic. | Objective: 4.2 – Attacks | Follow-up Question: What type of attack can ARP poisoning enable?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which technique involves sending falsified ARP messages to impersonate another host on a LAN?
- MAC flooding
- DNS poisoning
- Rogue AP
- ARP spoofing

A

ARP spoofing | Practical Use: Intercepting login credentials on a LAN. | Explanation: ARP spoofing links the attacker’s MAC to a victim’s IP. | Objective: 4.2 – Attacks | Follow-up Question: How does ARP spoofing differ from ARP poisoning?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which attack corrupts DNS cache to redirect users to malicious websites?
- VLAN hopping
- On-path attack
- DNS poisoning
- Evil twin

A

DNS poisoning | Practical Use: Redirecting a bank’s domain to a fake website. | Explanation: DNS poisoning changes DNS records to send users to rogue sites. | Objective: 4.2 – Attacks | Follow-up Question: How does DNS poisoning impact user trust in the internet?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which attack alters DNS records to redirect traffic to fraudulent websites?
- MAC flooding
- DNS spoofing
- DoS
- Rogue DHCP

A

DNS spoofing | Practical Use: Users are redirected to a phishing page that looks like Gmail. | Explanation: DNS spoofing tricks users into giving sensitive information. | Objective: 4.2 – Attacks | Follow-up Question: How is DNS spoofing related to phishing attacks?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is a rogue device?
- A corrupted DNS record
- A malicious firewall rule
- An unauthorized device connected to the network
- A self-signed certificate

A

An unauthorized device connected to the network | Practical Use: Rogue laptops or access points used by attackers. | Explanation: Rogue devices can manipulate or intercept traffic. | Objective: 4.2 – Attacks | Follow-up Question: Why are rogue DHCP servers dangerous?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which type of rogue device gives clients incorrect IP settings to reroute traffic?
- Rogue AP
- Rogue DHCP server
- Evil twin
- VLAN hopper

A

Rogue DHCP server | Practical Use: Clients unknowingly route traffic through an attacker’s system. | Explanation: Rogue DHCP servers assign malicious network configurations. | Objective: 4.2 – Attacks | Follow-up Question: How can DHCP snooping defend against rogue DHCP servers?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which rogue device pretends to be a legitimate Wi-Fi access point?
- Rogue AP
- DNS poisoning
- Evil twin
- Rogue DHCP

A

Rogue AP | Practical Use: Unauthorized Wi-Fi access to capture data. | Explanation: Rogue APs provide attackers access to network resources. | Objective: 4.2 – Attacks | Follow-up Question: What’s the difference between a rogue AP and an evil twin?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which attack creates a fake Wi-Fi hotspot with the same SSID as a legitimate one?
- VLAN hopping
- DNS spoofing
- Rogue AP
- Evil twin

A

Evil twin | Practical Use: Tricking users to connect and leak credentials. | Explanation: Evil twins impersonate trusted Wi-Fi networks. | Objective: 4.2 – Attacks | Follow-up Question: How can end users detect an evil twin?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which attack intercepts communication between two parties without their knowledge?
- Phishing
- On-path attack
- ARP poisoning
- VLAN hopping

A

On-path attack | Practical Use: Eavesdropping on sensitive emails. | Explanation: On-path attacks (MITM) allow interception and manipulation of data. | Objective: 4.2 – Attacks | Follow-up Question: How does HTTPS help prevent on-path attacks?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of attack manipulates people instead of technology to gain access?
- Malware
- ARP poisoning
- Social engineering
- VLAN hopping

A

Social engineering | Practical Use: Tricking employees to share passwords. | Explanation: Social engineering exploits human trust. | Objective: 4.2 – Attacks | Follow-up Question: Why is social engineering often more effective than technical exploits?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which attack involves tricking users into revealing information through fake emails or messages?
- Tailgating
- Evil twin
- Dumpster diving
- Phishing

A

Phishing | Practical Use: Fake bank emails stealing login credentials. | Explanation: Phishing pretends to be a trusted entity. | Objective: 4.2 – Social engineering | Follow-up Question: What’s the difference between phishing and spear phishing?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which method involves attackers searching through discarded materials to find sensitive data?
- Shoulder surfing
- Dumpster diving
- Rogue device
- Malware

A

Dumpster diving | Practical Use: Retrieving shredded but readable documents. | Explanation: Dumpster diving finds confidential data in trash. | Objective: 4.2 – Social engineering | Follow-up Question: What’s one mitigation against dumpster diving?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which attack involves observing someone entering a password or PIN?
- Shoulder surfing
- Phishing
- On-path attack
- MAC flooding

A

Shoulder surfing | Practical Use: Looking over a shoulder at an ATM. | Explanation: Shoulder surfing directly observes credentials. | Objective: 4.2 – Social engineering | Follow-up Question: How can privacy screens reduce shoulder surfing risk?

17
Q

Which attack occurs when an unauthorized person follows an employee into a secure area?
- Rogue AP
- Dumpster diving
- Tailgating
- Evil twin

A

Tailgating | Practical Use: Attacker slips into a data center behind an employee. | Explanation: Tailgating exploits human trust to bypass physical security. | Objective: 4.2 – Social engineering | Follow-up Question: What physical controls help prevent tailgating?

18
Q

Which term describes malicious software designed to harm computers or networks?
- Malware
- Vulnerability
- Risk
- Exploit

A

Malware | Practical Use: Ransomware encrypting company files for payment. | Explanation: Malware includes viruses, worms, trojans, ransomware, spyware, and adware. | Objective: 4.2 – Attacks | Follow-up Question: What’s one difference between a virus and a worm?