Hacking
Attacks
Bluetooth
Tools
FINAL Jeopardy
100

This type of hacker has malicious intent and does not have permission to access systems.

What is an unauthorized hacker?

100

This type of attack can be used to send the user to a malicious website

What is DNS spoofing?

100

This is the term for gaining access to a device via a Bluetooth backdoor

What is bluebugging?

100

This Windows tool can be used to view security logs

What is Event Viewer?

200

This type of hacker has permission to access and test systems.

What is an authorized hacker?

200

This type of attack is when the attacker sends fake packets with a false IP address to deceive the recipient

What is IP spoofing?

200

This is the term for getting data from a bluetooth device

What is bluesnarfing?

200

This Windows tool can be used to view network connections

What is Netstat?

300

This type of hacker might have good intentions, but does not have permission to access systems.

What is a semi-authorized hacker?

300

This type of attack is when the attacker sends fake ARP packets with a false IP address and MAC address to deceive the recipient

What is ARP spoofing?

300

This is the term for spamming messages to a bluetooth device  

What is bluejacking?

300

This Windows tool can be used to view running processes

What is Task Manager?

400

This team is the defensive team in a penetration testing exercise.

What is the blue team?

400

This type of attack is also known as ARP poisoning

What is ARP spoofing?

400

This attack involves an access point that is meant to look like another access point to attempt to trick users to connect to that access point

What is an evil twin attack?

400

This type of assessment uses a report of where a system might be vulnerable

What is vulnerability assessment?

500

This team is the offensive team in a penetration testing exercise.

What is the red team?

500

This type of attack makes a system or server unavailable by making it unable to perform tasks or respond to users

What is a DoS attack?

500

This attack involves a wireless access point that is installed on a secure network without authorization

What is a rogue access point?

500

This type of assessment tries to exploit vulnerabilities in a system to see if the actor can get into the system

What is penetration testing?

500

This is how malicious actors maintain access to a system after exploiting vulnerabilities

What is persistence?