Denial of service (DoS) - attacks overwhelm a targeted server or network with excessive traffic to render it unavailable to its intended users., distributed denial of service (DDoS) - attacks are a more complex form of DoS, utilizing compromised computers or botnets across the internet to conduct a massive, coordinated attack, significantly amplifying the attack's scale and impact., VLAN hopping - is a network attack technique that exploits vulnerabilities to send packets from one VLAN to another, bypassing Layer 2 security measures., Media access control (MAC) flooding - an attack technique where an attacker overwhelms a network switch with fake MAC addresses, causing the switch to enter a fail-open mode., Address resolution protocol (ARP) poisoning - involves sending malicious ARP messages to a local network, associating the attacker's MAC address with the IP address of a legitimate device. This allows the attacker to intercept, modify, or block data intended for the legitimate IP address, leading to potential data breaches or on-path attacks., ARP spoofing - technique where an attacker sends falsified ARP (Address Resolution Protocol) messages over a local area network., DNS poisoning - involves corrupting the DNS cache with false information on, redirecting users to malicious websites even when they type correct domain names, DNS spoofing - to redirect traffic from legitimate websites to fraudulent ones. This attack can lead to users unknowingly providing sensitive information to attackers, facilitating phishing attacks, or spreading malware., Rogue devices and services - Unauthorized devices that are connected to a network without permission., Rogue DHCP - unauthorized DHCP server on a network that provides incorrect IP addresses to clients., Rogue AP - unauthorized Wi-Fi access point installed on a network without the network administrator's consent., Evil twin - a malicious Wi-Fi access point that masquerades as a legitimate one by using the same SSID., On path attack - intercepts and potentially alters the communication between two parties without their knowledge., Social engineering - manipulating individuals into divulging confidential information or performing actions that compromise security., Phishing - attack where attackers deceive individuals into providing sensitive information on, such as login credentials and credit card numbers, by masquerading as a trustworthy entity in electronic communications, typically through email, Malware - malicious software designed to infiltrate, damage, or disable computers, networks, and systems. Common types of malware include viruses, worms, trojans, ransomware, spyware, and adware,
0%
4.2 types of attacks
Sdílet
Sdílet
Sdílet
podle
Gprimal
Comptia
N10-009
Network plus
Upravit obsah
Tisk
Vložit
Více
Přiřazení
Výsledková tabule/Žebříček
Zobrazit více
Zobrazit méně
Tento žebříček je v současné době soukromý. Klikněte na
Share
chcete-li jej zveřejnit.
Tuto výsledkovou tabuli vypnul majitel zdroje.
Tento žebříček je zakázán, protože vaše možnosti jsou jiné než možnosti vlastníka zdroje.
Možnosti vrácení
Spojte odpovídající
je otevřená šablona. Negeneruje skóre pro žebříček.
Vyžaduje se přihlášení.
Vizuální styl
Fonty
Je vyžadováno předplatné
Možnosti
Přepnout šablonu
Zobrazit vše
Při přehrávání aktivity se zobrazí další formáty.
Otevřené výsledky
Kopírovat odkaz
QR kód
Odstranit
Obnovit automatické uložení:
?