Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question 2 4 ( 1 point ) What is an example of an alteration threat? Question 2 4 options: Espionage System or data modification Intentional

Question 24(1 point)
What is an example of an alteration threat?
Question 24 options:
Espionage
System or data modification
Intentional information leak
Denial of service
Question 25(1 point)
Which type of attack involves eavesdropping on transmissions and redirecting them for unauthorized use?
Question 25 options:
Interception
Interruption
Fabrication
Modification
Question 26(1 point)
A hacker has stolen logon IDs and passwords. The hacker is now attempting to gain unauthorized access to a public-facing web application by using the stolen credentials one by one. What type of attack is taking place?
Question 26 options:
Birthday attack
Replay attack
Phreaking
Credential harvesting
Question 27(1 point)
Which attack is typically used specifically against password files that contain cryptographic hashes?
Question 27 options:
Hijack
Replay
Birthday
Social engineering
Question 28(1 point)
Brian notices an attack taking place on his network. When he digs deeper, he realizes that the attacker has a physical presence on the local network and is forging Media Access Control (MAC) addresses. Which type of attack is most likely taking place?
Question 28 options:
Address resolution protocol (ARP) poisoning
Internet Protocol (IP) address spoofing
Uniform resource locator (URL) hijacking
Christmas attack
Question 29(1 point)
In which type of attack does the attacker attempt to take over an existing connection between two systems?
Question 29 options:
Man-in-the-middle attack
Uniform resource locator (URL) hijacking
Session hijacking
Typosquatting
Question 30(1 point)
Saved
Barry discovers that an attacker is running an access point in a building adjacent to his company. The access point is broadcasting the security set identifier (SSID) of an open network owned by the coffee shop in his lobby. Which type of attack is likely taking place?
Question 30 options:
Evil twin
Near field communication
Bluesnarfing
Jamming/interference

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions