This attack only occurs in Linux/Unix systems due to the dotted decimal file/folder system
DAILY TRIPLE!!!!!!!!
What is a Directory Traversal Attack?
A __________ table stores thousands of precomputed hashes
What is a Rainbow table?
Standard for authentication
What is 802.1x
DHCP
What are ports 67 and 68?
a malware program that includes a back door for remote administrative control over the target computer. These are usually downloaded invisibly with a user-requested program -- such as a game -- or sent as an email attachment.
What is a RAT (Remote Access Trojan)?
the process of planning and designing a wireless network, to provide a wireless solution that will deliver the required wireless coverage, data rates, network capacity, roaming capability and Quality of Service (QoS). The survey usually involves a site visit to test for RF interference, and to identify optimum installation locations for access points. This requires analysis of building floor plans, inspection of the facility, and use of site survey tools.
What is a wireless site survey?
A __________ firewall looks at every communication, regardless if it has already been initiated and accepted
What is Stateless?
Used for authentication in home or SOHO networks
What is PSK (Pre Shared Key)?
DNS
What is port 53?
I am considered a cryptographic attack. I exploit the plaintext mixed in with the encrypted data. I am also known by the acronym KPA
DAILY DOUBLE!!!!!!!!!!!!
What is a Known Plaintext attack?
the practice of concealing a file, message, image, or video within another file, message, image, or video.
What is Steganography?
A _____ request opens a TCP/IP connection
What is SYN?
a solution that uses a set of protocols to define and implement a policy that describes how to secure access to network nodes by devices when they initially attempt to access the network
What is NAC ( Network Access Control)?
SMTP
What is port 25?
an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.
DAILY DOUBLE!!!!!!!!!!!!!!!!
What is MITM ( Man-In-The-Middle ) Attack?
The radiation pattern of this antenna is often described as doughnut shaped
What is Omnidirectional?
_________ access points rely upon wireless controllers
DAILY TRIPLE!!!!!!!!!!!!!!
What is thin?
An enterprise level authentication server that starts with a "R"
What is RADIUS?
SNMP
What are ports 161 and 162?
sometimes also known as cookie hijacking is the exploitation of a valid computer session—sometimes also called a session key—to gain unauthorized access to information or services in a computer system.
DAILY DOUBLE!!!!!
What is Session Hijacking?
the customized login page that businesses require users to pass through before connecting to the Wi-Fi network. Airports, coffee shops, and hotels are the most popular places to find them, but any type of business can benefit from using this
What is a Captive Portal?
A _________________ rule will never be executed due to it's placement in the ACL
DAILY TRIPLE!!!!!!!!!!!!!!!
What is shadowed?
the customized login page that businesses require users to pass through before connecting to the Wi-Fi network. Airports, coffee shops, and hotels are the most popular places to find them, but any type of business can benefit from using this
DAILY DOUBLE!!!!!!!!
What is a Captive Portal?
NetBIOS
What are ports 137, 138 and 139?
Name 3 of the principles used in Social Engineering
DAILY TRIPLE!!!!!!!!!!!!!
What is Authority, Scarcity, Intimidation, Urgency, Social Proof and Familiarity?