Attack Types
Social engineering
Wireless attacks
Application Attacks
Everything
100
A form of active interception or active eavesdropping. Uses a separate computer that accepts traffic from each party in a conversation and forwards that traffic between the two.
What is man-in-the-middle attack?
100
Looking over someone to gain information.
What is shoulder surfing?
100
A rogue access point that has the same SSID as a legitimate access point.
What is evil twin?
100
A web application vulnerability where attacks embed malicious html or javascript code into an email or website error message.
What is XSS (Cross site scripting)?
100
Explain mean time between repair.
What is the average it takes for something to be repaired and put back into service.
200
Spoofs the source address of a directed broadcast ping packet to flood a victim with ping replies.
What is smurf attack?
200
Occurs when one user follows closely behind another without using credentials.
What is tailgating?
200
The practice of looking for wireless networks.
What is war driving?
200
Attackers enter additional data into the web page form to generate different statements. Typically uses a phrase of "or 1 = 1".
What is SQL injection?
200
Explain ALE.
What is SLE x ARO or what the single cost of an event is and how often it's expected to happen per year make up the annualized loss expectancy.
300
A form of spam using instant messaging.
What is SPIM?
300
A message that tells of impending doom from a virus or other security related threat that doesn't exist.
What is a hoax?
300
The sending of unsolicited messages to nearby Bluetooth devices.
What is bluejacking?
300
Injects operating system commands into an application using web page forms or text boxes.
What is directory traversal/command injection?
300
Port 389.
What is LDAP?
400
An attack that misleads computers or switches about the actual mac address of a system. Does this by spoofing mac addresses on systems.
What is ARP poisoning?
400
Attacks that use the phone system to trick users into giving up personal and financial information.
What is vishing?
400
This is sent with every packet and used to crack a network. Attackers use packet injection to add additional packets into the data stream increasing the probability that it will reuse a key.
What is IV attack?
400
This is where an attacker tricks a user into performing an action on a website. The attacker creates a specially crafted HTML link and the user performs the action without realizing it.
What is XSRF (Cross site request forgery)?
400
Port 161.
What is SNMP?
500
This occurs when someone buys a domain name that is close to a legitimate domain name. Done for malicious purposes.
What is URL Hijacking/Typo squatting?
500
Describe consensus/social proof.
What is using percentages or others names in order to back up the social engineering attack.
500
Explain why WPS is susceptible to attacks.
What is because it uses a pin it is susceptible to brute force attacks.
500
An attack that exploits an undocumented vulnerability.
What is zero day exploit?
500
Describe the two ways IPsec provides security.
What is authentication and encryption. (AH/ESP)(51/50)