Question: 12.If an attacker was able to make changes to the computer's cache of IP address to MAC address mapping, which type of attack has occurred?
12.If an attacker was able to make changes to the computer's cache of IP address to MAC address mapping, which type of attack has occurred? ARP poisoning Distributed denial-of-service Wiretapping Spoofing
13.What type of exploit is occurring when an attacker attempts to hide their identity while communicating on a network? Spoofing Denial-of-service ARP poisoning Smurf attack
14.An attacker repeatedly enters the wrong password for the managers account and has now locked the account. Which category of the CIA triad was compromised? Confidentiality Integration Availability Integrity
15.An attacker was able to perform a denial of service attack on the email server and now users are unable to retrieve their emails. Which category of the CIA triad was compromised? Authorization Availability Integrity Confidentiality
16.Attackers that choose to perform malicious attacks for profit are called white hat attackers. False True
17.Sam was just hired to work on the security team that will be attempting to compromise the company's network to discover what vulnerability exist. Which team did he get hired to? Red Blue White Purple
18.As you are reading a confidential email, a coworker is looking over your shoulder at the email. Which category of the CIA triad was compromised? Confidentiality Accessibility Integrity Availability
19.When a company allows its users to access company resources through their personal cell phones, what vulnerability is represented? Industry threat Misconfigured firewall Weak password BYOD/mobile
20.A user is setting up his new work account and sets his password to password01 so he can easily remember it. What type of vulnerability did his password choice create? Zero-day Brute-force Default password Weak password
21.Which exploit includes using breaching the network cable and using a packet sniffer to listen and record the traffic on the network? Wiretapping ARP poisoning Port scanning Session hijacking
22.I have very little IT experience but decide to use an advanced hacking tool to perform a denial-of-service attack on banks network. What type of attacker would I be considered? Script kiddie Black Hat Insider threat White Hat
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
