Network Attacks
Which of these describes a rogue AP attack?
An employee at a company plugs a router into the company network to make a simple wireless network. An attacker standing outside the building takes advantage of this and goes onto the wireless network. This is an example of a rogue AP attack.
Which one of these shows why a DNS cache poisoning attack is dangerous?
It allows an attacker to redirect targets to malicious web servers. By inserting fake DNS records into a DNS server's cache, every client that queries this record will be redirected to a compromised web server, and fake, damaging sites run by attackers.
Which one of the following results from a denial-of-service attack?
Service unreachable A denial-of-service attack is meant to prevent legitimate traffic from reaching a service. This is usually done by flooding the victim with attack traffic, which renders services unreachable.
Which of the following is true of a DDoS attack?
The attack traffic comes from lots of different hosts. The "Distributed" in DDoS means that the attack traffic is distributed across a large number of hosts, resulting in the attack coming from many different machines.
A person at a coffee shop leaves a laptop logged in with a token and walks away for a short time. An attacker goes to the laptop and starts impersonating the laptop's user on the website the user is logged into. What kind of attack is this?
A session hijacking attack An attacker sneaking into a session by stealing a token and impersonating a user is an example of a session hijacking.