Sniffing and Network Attacks
DoS and DDoS Attacks
IDS
Firewalls and Honeypots
Suprise Me!
100

A fake online bank site sits between a user and the real bank, secretly passing messages back and forth while reading everything

What is a man-in-the-middle (MITM) attack?

100

A single computer sends nonstop requests to a website until it crashes and becomes unavailable

What is a Denial-of-Service (DoS) attack?

100

A hacker is detected while attacking a system, which triggers an immediate alert

What is a true positive?

100

A simple, fake login page is set up to lure attackers and collect basic information

What is a low level honeypot?

100

A security tool that can be physical or virtual and is designed to lure attackers away from real systems by acting as a target

What is a honeypot?

200

Wireshark, TCPDump, Cain and Abel, and Ettercap

What are sniffing tools?

200

Thousands of infected computers suddenly all spam a gaming server at the same time until it goes offline

What is a Distributed Denial-of-Service (DDoS) attack?

200

A hacker successfully breaks into the system but the security tools do not detect anything unusual

What is a false negative?

200

Repeated login attempts, unknown IP addresses, unusual traffic

What are network intrusion signs?

300

An attacker sends fake ARP messages to link their MAC to a legitimate IP address

What is ARP poisoning?

300

A fake traffic surge overwhelms an online store by using massive amounts of data all at once

What is a volumetric attack?

300

A user is trying to access a website but the system mistakenly blocks it thinking it is an attack

What is a false positive?

300

A fully real-looking company server is set up so that an attacker believes they have full control, but every action they take is secretly recorded and analyzed in detail

What is a high level honeypot?

400

The first step of a session hijacking attempt, where an attacker captures communication between a client and server

What is sniffing the traffic?

400

A malicious update is sent to a device and permanently damages its system so it no longer works

What is phlashing?

400

A security system spots a unusual login attempt because it matches a known hacker pattern already stored in its database

What is signature-based detection?

400

A firewall feature that validates traffic based on connection state

What is stateful inspection?

500

A tool performs DNS spoofing attacks but first requires ARP poisoning to intercept network traffic

What is Ettercap?

500

An attack protection method that drops malicious traffic in a designated network area

What is black hole filtering?

500

A network system raises an alert because traffic suddenly looks very different from normal student activity patterns

What is anomaly-based detection?

500

A security tester sends various TCP and UDP packets to a firewall and studies how it responds

What is firewalking?

500

An attacker hides malicious communication inside normal web or network traffic so it blends in with allowed data and avoids security detection at the firewall

What is tunneling?

M
e
n
u