Denial of service (DoS) - attacks overwhelm a targeted server or network with excessive traffic to render it unavailable to its intended users., distributed denial of service (DDoS) - attacks are a more complex form of DoS, utilizing compromised computers or botnets across the internet to conduct a massive, coordinated attack, significantly amplifying the attack's scale and impact., VLAN hopping - is a network attack technique that exploits vulnerabilities to send packets from one VLAN to another, bypassing Layer 2 security measures., Media access control (MAC) flooding - an attack technique where an attacker overwhelms a network switch with fake MAC addresses, causing the switch to enter a fail-open mode., Address resolution protocol (ARP) poisoning - involves sending malicious ARP messages to a local network, associating the attacker's MAC address with the IP address of a legitimate device. This allows the attacker to intercept, modify, or block data intended for the legitimate IP address, leading to potential data breaches or on-path attacks., ARP spoofing - technique where an attacker sends falsified ARP (Address Resolution Protocol) messages over a local area network., DNS poisoning - involves corrupting the DNS cache with false information on, redirecting users to malicious websites even when they type correct domain names, DNS spoofing - to redirect traffic from legitimate websites to fraudulent ones. This attack can lead to users unknowingly providing sensitive information to attackers, facilitating phishing attacks, or spreading malware., Rogue devices and services - Unauthorized devices that are connected to a network without permission., Rogue DHCP - unauthorized DHCP server on a network that provides incorrect IP addresses to clients., Rogue AP - unauthorized Wi-Fi access point installed on a network without the network administrator's consent., Evil twin - a malicious Wi-Fi access point that masquerades as a legitimate one by using the same SSID., On path attack - intercepts and potentially alters the communication between two parties without their knowledge., Social engineering - manipulating individuals into divulging confidential information or performing actions that compromise security., Phishing - attack where attackers deceive individuals into providing sensitive information on, such as login credentials and credit card numbers, by masquerading as a trustworthy entity in electronic communications, typically through email, Malware - malicious software designed to infiltrate, damage, or disable computers, networks, and systems. Common types of malware include viruses, worms, trojans, ransomware, spyware, and adware,
0%
4.2 types of attacks
Podeli
Podeli
Podeli
autor
Gprimal
Comptia
N10-009
Network plus
Uredi sadržaj
Odštampaj
Ugradi
Više
Zadatke
Tabela
Prikaži više
Prikaži manje
Ova tabela je trenutno privatna. Kliknite na
Podeli
da biste je objavili.
Pristup tabeli je onemogućio vlasnik sredstva.
Ova tabela je onemogućena pošto Vam se podešavanja razlikuju od podešavanja vlasnika sredstva.
Vrati podešavanja
Spoji
je otvoreni šablon. On ne generiše rezultate za tabelu rangiranja.
Prijava je obavezna
Vizuelni stil
Fontove
Potrebna je pretplata
Postavke
Promeni šablon
Prikaži sve
Više formata će se pojaviti tokom igranja aktivnosti.
Otvoreni rezultati
Kopiraj vezu
QR kôd
Izbriši
Vrati automatski sačuvano:
?