Networking CLI
DOS Attacks
Spoofing & Sniffing
Wireless / Bluetooth/ VPNs
Pentesting
100

You want to view your computer’s IP address, subnet mask, and default gateway on a Windows machine.

ipconfig
100

This type of attack tries to make a service unavailable by overwhelming it with traffic or requests

DOS or DDOS

100

Pretending to be a trusted device, user, website, or address to trick someone or a system is called this.

Spoofing

100

A VPN primarily helps by doing this to your traffic between your device and the VPN server.

Encrypting the traffic (creating a secure tunnel)

100

Authorized security testing performed to find vulnerabilities before real attackers do is called this.

Penetration testing

200

You want to test whether your computer can reach another device on the network by sending small packets and checking for replies.

ping

200

This is the key difference between DoS and DDoS: a DDoS attack comes from ______.

Multiple devices

200

Capturing and inspecting network traffic packets is called this.

Sniffing

200

“A VPN makes me invisible and unhackable.” Is that accurate? Explain why. 

False. 

A VPN improves privacy but does not make you invisible. The VPN provider can still "see" you and could potentially sell your information.

200

Code, a technique, or a method that takes advantage of a vulnerability is called this.

Exploit

300

You suspect a system is making strange network connections. You want to see active connections and listening ports from the command line.  

netstat

300

What are computers involved in a DDOS attack called. 

Zombies / Botnet

300

A fake email appears to come from a teacher or bank to trick someone into clicking a link. This is an example of ______.

Spoofing (phishing)

300
How can you prevent bluetooth threats?
Turn off bluetooth when not using it / Unpair devices / Update software
300

A hidden way for an attacker to regain access later, even after initial compromise, is called this.

Backdoor

400

Open a secure encrypted connection with another computer. Allows you to work remotely on another computer

ssh

400

This is a common goal of a DoS/DDoS attack, even if no files are stolen.

Disrupting availability

400

A user on public Wi-Fi logs into a site over HTTP instead of HTTPS. Which attack topic from this category becomes a much bigger risk, and why?

Sniffing, unencrypted traffic can be captured/read 

400

Name 2 ways to improve security while on public wifi.

•Turn on your firewall.

•Make sure Anti-Virus is up to date and running.

•Confirm the name of the network

•Do NOT use a credit card or do any online shopping.

•Use VPN software

400

On a Windows PC, this built-in tool can help you spot suspicious processes using high CPU, RAM, or disk unexpectedly.

Task Manager / Process Explorer

500

Open a port to listen for incoming connections or connect to another listening device

netcat

500

Give one realistic mitigation/defense for DoS/DDoS attacks used by organizations.

Rate limiting, traffic filtering, load balancing, or DDoS protection service

500

What is ARP poisoning?

Putting a false MAC address entry in the target’s ARP cache with the result that packets will be directed to the attack computer instead of the intended receiver.

500

What is an evil twin attack?

The attacker’s access point is set up to look like a better connection option. Once you connect to the evil access point, the attacker can analyze your network traffic and execute MitM attacks.

500

A process has a strange name, high CPU usage, and launches at startup, but the user doesn’t recognize it. What is the best next step?

Investigate. Check which user is running it. Check the process in Process Explorer. Check the threat level. Terminate the process. Delete necessary files.

M
e
n
u