4.4

Ace your homework & exams now with Quizwiz!

What is deauthentcation?

A wireless deauthentication attack isa form of a DoS attack in which the attacker sends a large number of management packets called deauthentication frames on the WLAN, causing stations to be disconnected from the access point.

What is an Evil Twin?

An AP that is not under your control but is used to perform a hijacking attack.

What is a rogue access point?

An access point that you do not control or manage.

What is an exploit?

An exploit occurs when a threat agent takes advantage of a vulnerability and uses it to advance an attack.

What is ARP poisoning?

Attacker modifies MAC address in ARP cache to point to different computer

What is DNS poisoning?

Attempts to corrupt DNS data. - can point to an alternate website

What is a Smurf attack?

ICMP Echo Request attacks (Smurf attack) can be considered one form of reflected attack, as the flooding host(s) send Echo Requests to the broadcast addresses of mis-configured networks, thereby enticing hosts to send Echo Reply packets to the victim. Some early DDoS programs implemented a distributed form of this attack.

What is an amplified attack?

A Domain Name Server (DNS) Amplification attack is a popular form of Distributed Denial of Service (DDoS), in which attackers use publically accessible open DNS servers to flood a target system with DNS response traffic.

What is Denial of service?

A denial-of-service attack (DoS attack) is a cyber-attack in which the perpetrator seeks to make a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet.

What is a reflective DOS attack?

A distributed denial-of-service attack may involve sending forged requests of some type to a very large number of computers that will reply to the requests. Using Internet Protocol address spoofing, the source address is set to that of the targeted victim, which means all the replies will go to (and flood) the target. (This reflected attack form is sometimes called a "DRDOS".[60])

What is a logic bomb?

A logic bomb is a piece of code intentionally inserted into a software system that will set off a malicious function when specified conditions are met. For example, a programmer may hide a piece of code that starts deleting files (such as a salary database trigger), should they ever be terminated from the company.

What is a vulnerability?

A vulenrability is the absence of a countermeasure or a weakness in a countermeasure that is in place.

What is social engineering?

Refers to the act of attempting to illegaly obtain sensitive information by prenting to be a credible source

What is VLAN Hoping?

VLAN hopping is a computer security exploit, a method of attacking networked resources on a virtual LAN (VLAN). The basic concept behind all VLAN hopping attacks is for an attacking host on a VLAN to gain access to traffic on other VLANs that would normally not be accessible. There are two primary methods of VLAN hopping: switch spoofing and double tagging.

What is DDoS?

a distributed denial-of-service attack (DDoS attack), the incoming traffic flooding the victim originates from many different sources. This effectively makes it impossible to stop the attack simply by blocking a single source


Related study sets

ONRT 3 Abolition and Antebellum Slavery Part 2

View Set

A&P 1, Chapter 1 - Lesson Objectives & Test Yourself Q&A's

View Set

Chemistry 1301 Final Exam Review

View Set

Chapter 62 Classification of Medications

View Set

Unit 10: Classification Unit Review

View Set

Measuring Health and Development

View Set

Chapter 23 Plant Evolution and Diversity - BSC 111

View Set

Chapter 4, Lesson 1, pages 136-139

View Set

Live Virtual Machine Lab 10.1: Module 10 General Network Attacks

View Set