1/31
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Technology that enables devices to connect to a network via radio signals
A fraudulent wireless access point (AP) that masquerades as a legitimate one to intercept data.
Unauthorized wireless access point set up within an organization’s network without administrative approval.
Unauthorized access and theft of data from Bluetooth-enabled devices.
Sending unsolicited messages or data (like images) to Bluetooth-enabled devices.
An attack that forces a wireless client to disconnect from the network by spoofing de-authentication frames.
Deliberate disruption of radio signals to create denial-of-service on wireless networks.
Wireless use of electromagnetic fields to identify objects tagged with RFID chips.
Short-range wireless technology for data exchange over distances typically less than 10 cm.
Randomization data used at the beginning of cryptographic processes to ensure unique encryption.
Attacker intercepts and potentially modifies communications between two parties without their knowledge.
Malware-based attack that manipulates browser behavior to alter transactions or data.
Attacks that exploit vulnerabilities at the data link layer
Corrupting ARP caches by sending falsified ARP messages to redirect network traffic.
Flooding a network switch with fake MAC addresses to overwhelm its MAC table.
Changing a device’s MAC address to bypass security controls or impersonate another device.
Hierarchical system translating human-readable domain names to IP addresses.
Unauthorized modification or theft of domain registration details.
Inserting false DNS records into a DNS server or cache to redirect traffic.
Attack technique that directs users from a legitimate URL to a fraudulent site.
Assessment of IP/domain behavior indicating reliability or maliciousness.
Attack where multiple compromised systems flood a target with excessive traffic.
DoS attack that exploits TCP three-way handshake
DoS attack involving oversized ping packets causing system crashes.
Amplification DDoS attack using Connectionless Lightweight Directory Access Protocol (CLDAP) responses directed at victims.
Networks controlling industrial and physical processes.
Automated attacks using scripting languages or automation tools.
Windows scripting language integrated with OS for administrative tasks.
Cross-platform scripting language used for automating tasks and cyberattacks.
Linux command interpreter that executes shell commands and scripts.
Scripted automation within applications like Microsoft Office or PDFs.
Older Microsoft scripting language used to automate tasks within Office applications.