Denial of service (DoS) - attacks overwhelm a targeted server or network with excessive traffic to render it unavailable to its intended users., distributed denial of service (DDoS) - attacks are a more complex form of DoS, utilizing compromised computers or botnets across the internet to conduct a massive, coordinated attack, significantly amplifying the attack's scale and impact., VLAN hopping - is a network attack technique that exploits vulnerabilities to send packets from one VLAN to another, bypassing Layer 2 security measures., Media access control (MAC) flooding - an attack technique where an attacker overwhelms a network switch with fake MAC addresses, causing the switch to enter a fail-open mode., Address resolution protocol (ARP) poisoning - involves sending malicious ARP messages to a local network, associating the attacker's MAC address with the IP address of a legitimate device. This allows the attacker to intercept, modify, or block data intended for the legitimate IP address, leading to potential data breaches or on-path attacks., ARP spoofing - technique where an attacker sends falsified ARP (Address Resolution Protocol) messages over a local area network., DNS poisoning - involves corrupting the DNS cache with false information on, redirecting users to malicious websites even when they type correct domain names, DNS spoofing - to redirect traffic from legitimate websites to fraudulent ones. This attack can lead to users unknowingly providing sensitive information to attackers, facilitating phishing attacks, or spreading malware., Rogue devices and services - Unauthorized devices that are connected to a network without permission., Rogue DHCP - unauthorized DHCP server on a network that provides incorrect IP addresses to clients., Rogue AP - unauthorized Wi-Fi access point installed on a network without the network administrator's consent., Evil twin - a malicious Wi-Fi access point that masquerades as a legitimate one by using the same SSID., On path attack - intercepts and potentially alters the communication between two parties without their knowledge., Social engineering - manipulating individuals into divulging confidential information or performing actions that compromise security., Phishing - attack where attackers deceive individuals into providing sensitive information on, such as login credentials and credit card numbers, by masquerading as a trustworthy entity in electronic communications, typically through email, Malware - malicious software designed to infiltrate, damage, or disable computers, networks, and systems. Common types of malware include viruses, worms, trojans, ransomware, spyware, and adware,
0%
4.2 types of attacks
Ibahagi
Ibahagi
Ibahagi
ni
Gprimal
Comptia
N10-009
Network plus
I-edit ang Nilalaman
I-print
Naka-embed
Higit pa
Mga Assignment
Leaderboard
Magpakita pa
Huwag gaanong magpakita
Ang leaderboard na ito ay kasalukuyang pribado. I-click ang
ibahagi
upang gawin itong pampubliko.
Ang leaderboard na ito ay hindi pinagana ng may-ari ng aktibidad.
Hindi pinagana ang leaderboard na ito dahil ang iyong mga pagpipilian ay naiiba sa may-ari ng aktibidad..
Ibalik ang Opsyon
Pagtutugma
ay isang bukas na template. Hindi ito bumubuo ng mga marka para sa isang leaderboard.
Kailangan maglog-in
Estilo ng visual
Mga Font
Kailangan ang subscription
Mga pagpipilian
Magpalit ng template
Ipakita lahat
Mas marami pang format ang lilitaw habang nilalaro ang aktibidad.
Buksan ang mga resulta
Kopyahin ang link
QR code
Tanggalin
Ibalik ng awtomatikong pag-save:
?