Home
Explore
Exams
Search for anything
Login
Get started
Home
Chapter 4 - section 4.2 - Summarize various types of attacks
Chapter 4 - section 4.2 - Summarize various types of attacks
0.0
(0)
Rate it
Studied by 0 people
0.0
(0)
Rate it
Call Kai
Learn
Practice Test
Spaced Repetition
Match
Flashcards
Knowt Play
Card Sorting
1/20
Earn XP
Description and Tags
section 4.2
Add tags
Study Analytics
All Modes
Learn
Practice Test
Matching
Spaced Repetition
Name
Mastery
Learn
Test
Matching
Spaced
No study sessions yet.
21 Terms
View all (21)
Star these 21
1
New cards
Objective – Network Attacks and Threats
• Denial-of-service (DoS) / distributed denial-of-service (DDoS)
• VLAN hopping
• Media Access Control (MAC) flooding
• Address Resolution Protocol (ARP) poisoning
• ARP spoofing
• DNS poisoning
• DNS spoofing
• Rogue devices and services
▸ DHCP
▸ AP
• Evil twin
• On-path attack
• Social engineering
▸ Phishing
▸ Dumpster diving
▸ Shoulder surfing
▸ Tailgating
• Malware
2
New cards
Denial-of-Service (DoS)
• Attack that overwhelms a system
• Makes service unavailable to users
• Uses traffic floods or resource exhaustion
• Single attacker source
3
New cards
Distributed Denial-of-Service (DDoS)
• DoS attack from multiple systems
• Uses botnets
• Harder to block than DoS
• Exam critical distinction
4
New cards
VLAN Hopping
• Attacker accesses traffic from another VLAN
• Exploits misconfigured switches
• Breaks network segmentation
• Mitigated with proper VLAN configuration
5
New cards
MAC Flooding
• Attacker floods switch with fake MAC addresses
• Overflows CAM table
• Switch acts like a hub
• Enables packet sniffing
6
New cards
ARP Poisoning
• Corrupts ARP table with false mappings
• Redirects traffic to attacker
• Enables MITM attacks
• Layer 2 attack
7
New cards
ARP Spoofing
• Attacker pretends to be another device
• Sends fake ARP replies
• Often used with ARP poisoning
• Exam focus: same concept, different wording
8
New cards
DNS Poisoning
• Inserts false DNS records
• Redirects users to malicious sites
• Compromises name resolution
• High impact attack
9
New cards
DNS Spoofing
• Attacker responds with fake DNS answers
• Tricks clients into using wrong IP
• Often combined with poisoning
• Exam synonym awareness
10
New cards
Rogue Devices and Services
• Unauthorized systems on network
• Bypass security controls
• Common internal threat
11
New cards
Rogue DHCP Server
• Issues incorrect IP configurations
• Redirects traffic to attacker
• Causes network outages
• Prevented with DHCP snooping
12
New cards
Rogue Access Point (AP)
• Unauthorized wireless AP
• Allows attacker network access
• Common in public areas
• Security risk
13
New cards
Evil Twin
• Fake wireless AP impersonating real one
• Tricks users into connecting
• Used for credential theft
• Wireless attack
14
New cards
On-Path Attack
• Attacker intercepts communication
• Previously called MITM
• Can modify or capture data
• Enabled by ARP/DNS attacks
15
New cards
Social Engineering
• Manipulates people, not systems
• Exploits trust and behavior
• Very effective attack method
• Exam critical concept
16
New cards
Phishing
• Fraudulent messages impersonating trusted source
• Steals credentials or data
• Common via email and SMS
• High exam relevance
17
New cards
Dumpster Diving
• Searching trash for sensitive info
• Physical social engineering
• Prevented by proper disposal
18
New cards
Shoulder Surfing
• Observing user input directly
• Targets passwords or PINs
• Physical proximity required
19
New cards
Tailgating
• Following authorized person into secure area
• Physical security breach
• Prevented by access controls
20
New cards
Malware
• Malicious software
• Includes viruses, worms, trojans, ransomware
• Used to damage or steal data
• Core security exam topic
21
New cards
N10-009 Exam Check
• DDoS uses multiple attackers
• VLAN hopping breaks segmentation
• ARP and DNS attacks enable on-path attacks
• Social engineering targets humans