Page 1 of 1

Security+ Quiz - Attacks

targets a specific company or group of people in an attempt to capture personal info

Could be emails, IMs, text messages meant to trick users in to giving away personal info.

A service is unexpectedly caused to fail

An attacker on the same network will spoof the address resolution protocol. Usually changing the IP address for a designated MAC address so traffic will go the attacker instead of where its meant to go. Used in MITM attacks.

Exploits in OS or Apps that haven't been discovered yet or been made public that can be used by hackers.

An attack that captures certain packets of data and then can be used again later on to access that information again or pretend that the attacker is the end user.

A replay attack where the attacker gains the specific hash/username and it matches a specific end-user to gain access through their account.

entering code in to an app or web app in order to alter the data or gain info

Service being denied because attack is coming from many different places at one time. Botnets are usually involved

Clicking on a button on a screen that may look legitimate, but the attacker uses that to send you somewhere else

An attacker gets a link up on the victim’s computer and when the victim is logged in to a certain service, the attacker can get access

Changing the IP address associated with a domain name to get end-users to visit sites that they didn't mean to visit. Can usually be done once an attacker gains access to the DNS server.

Page 1 of 1