Network Attacks

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/15

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

16 Terms

1
New cards

As opposed to simple DoS attacks that usually are performed from a single system, a DDoS attack uses multiple compromised computer systems to perform the attack against its target. The intermediary systems that are used as a platform for the attack (often referred to as zombies, and collectively as a botnet) are the secondary victims of the DDoS attack.

True

2
New cards

A type of DDoS attack where an attacker exploits vulnerabilities in certain services or protocols to generate responses that are much larger than the original request is referred to as:

Amplified DDoS attack

3
New cards

What defines a reflected DDoS attack?

Utilizing third-party servers to reflect and amplify attack traffic towards the target

4
New cards

 A DNS amplification attack is a type of DDoS attack wherein an attacker sends a small, specially crafted DNS query containing a spoofed IP address (the victim’s IP) to a compromised DNS server. Upon receiving the query, the DNS server generates a much larger response packet, which is then sent to the victim's IP address, causing potential disruption due to overwhelming traffic.

True

5
New cards

Which of the answers listed below refers to a cyberattack technique that relies on providing false DNS information to a DNS resolver for the purpose of redirecting or manipulating the resolution of domain names to malicious IP addresses?

DNS spoofing 

6
New cards

Remapping a domain name to a rogue IP address is an example of what kind of exploit?

DNS cache poisoning 

7
New cards

When domain registrants due to unlawful actions of third parties lose control over their domain names, they fall victim to:

Domain hijacking

8
New cards

The practice of gaining unauthorized access to a Bluetooth device is known as:

 Bluesnarfing

9
New cards

 A wireless disassociation attack is a type of: (Select 2 answers)

  • Deauthentication attack

  •  DoS attack

10
New cards

A wireless jamming attack is a type of:

 DoS attack

11
New cards

Which wireless attack focuses on exploiting vulnerabilities found in WEP?

IV attack

12
New cards

Which of the following statements can be used to describe the characteristics of an on-path attack?

  • An on-path attack is also known as MITM attack

  • Attackers place themselves on the communication route between two devices

  • Attackers intercept or modify packets sent between two communicating devices

13
New cards

A network replay attack occurs when an attacker captures sensitive user data and resends it to the receiver with the intent of gaining unauthorized access or tricking the receiver into unauthorized operations.

True

14
New cards

What are the characteristic features of a session ID?

  • A piece of data that can be stored in a cookie, or embedded as an URL parameter

  • Typically stored on the client side (in the user's browser) rather than on the server 

  • A unique identifier assigned by the website to a specific user

15
New cards

In a session replay attack, an attacker intercepts and steals a valid session ID of a user and resends it to the server with the intent of gaining unauthorized access to the user's session or tricking the server into unauthorized operations on behalf of the legitimate user.

 True

16
New cards

A technique that allows an attacker to authenticate to a remote server without extracting cleartext password from a digest is called:

Pass the hash