Denial of service (DoS) - attacks overwhelm a targeted server or network with excessive traffic to render it unavailable to its intended users., distributed denial of service (DDoS) - attacks are a more complex form of DoS, utilizing compromised computers or botnets across the internet to conduct a massive, coordinated attack, significantly amplifying the attack's scale and impact., VLAN hopping - is a network attack technique that exploits vulnerabilities to send packets from one VLAN to another, bypassing Layer 2 security measures., Media access control (MAC) flooding - an attack technique where an attacker overwhelms a network switch with fake MAC addresses, causing the switch to enter a fail-open mode., Address resolution protocol (ARP) poisoning - involves sending malicious ARP messages to a local network, associating the attacker's MAC address with the IP address of a legitimate device. This allows the attacker to intercept, modify, or block data intended for the legitimate IP address, leading to potential data breaches or on-path attacks., ARP spoofing - technique where an attacker sends falsified ARP (Address Resolution Protocol) messages over a local area network., DNS poisoning - involves corrupting the DNS cache with false information on, redirecting users to malicious websites even when they type correct domain names, DNS spoofing - to redirect traffic from legitimate websites to fraudulent ones. This attack can lead to users unknowingly providing sensitive information to attackers, facilitating phishing attacks, or spreading malware., Rogue devices and services - Unauthorized devices that are connected to a network without permission., Rogue DHCP - unauthorized DHCP server on a network that provides incorrect IP addresses to clients., Rogue AP - unauthorized Wi-Fi access point installed on a network without the network administrator's consent., Evil twin - a malicious Wi-Fi access point that masquerades as a legitimate one by using the same SSID., On path attack - intercepts and potentially alters the communication between two parties without their knowledge., Social engineering - manipulating individuals into divulging confidential information or performing actions that compromise security., Phishing - attack where attackers deceive individuals into providing sensitive information on, such as login credentials and credit card numbers, by masquerading as a trustworthy entity in electronic communications, typically through email, Malware - malicious software designed to infiltrate, damage, or disable computers, networks, and systems. Common types of malware include viruses, worms, trojans, ransomware, spyware, and adware,
0%
4.2 types of attacks
Share
Share
Share
by
Gprimal
Comptia
N10-009
Network plus
I-edit ang Content
I-Print kini
Embed
Uban pa
Assignments
Leaderboard
Show more
Show less
Kini nga leaderboard naka-pribado. Pag-klik sa
Share
aron himuon kini nga publiko.
Kini nga leaderboard gi-disable sa tag-iya sa resource.
Kini nga leaderboard gi-disable tungod ang imong mga kapilian lahi ra sa tag-iya sa resource.
I-revert ang mga Kapilian
Ang
Match up
usa ka open-ended nga template. Dili kini makamugna ug mga marka sa leaderboard.
Kinahanglan mag log in
Visual style
Fonts
Subscription required
Mga Option
I-switch ang template
Ipakita tanan
Daghang mga format ang mugawas samtang gidula nimo ang activity.
Open results
Copy link
QR code
Mag-delete
I-restore ang gi-autosave:
?