Question: 12.If an attacker was able to make changes to the computer's cache of IP address to MAC address mapping, which type of attack has occurred?

12.If an attacker was able to make changes to the computer's cache of IP address to MAC address mapping, which type of attack has occurred? ARP poisoning Distributed denial-of-service Wiretapping Spoofing

13.What type of exploit is occurring when an attacker attempts to hide their identity while communicating on a network? Spoofing Denial-of-service ARP poisoning Smurf attack

14.An attacker repeatedly enters the wrong password for the managers account and has now locked the account. Which category of the CIA triad was compromised? Confidentiality Integration Availability Integrity

15.An attacker was able to perform a denial of service attack on the email server and now users are unable to retrieve their emails. Which category of the CIA triad was compromised? Authorization Availability Integrity Confidentiality

16.Attackers that choose to perform malicious attacks for profit are called white hat attackers. False True

17.Sam was just hired to work on the security team that will be attempting to compromise the company's network to discover what vulnerability exist. Which team did he get hired to? Red Blue White Purple

18.As you are reading a confidential email, a coworker is looking over your shoulder at the email. Which category of the CIA triad was compromised? Confidentiality Accessibility Integrity Availability

19.When a company allows its users to access company resources through their personal cell phones, what vulnerability is represented? Industry threat Misconfigured firewall Weak password BYOD/mobile

20.A user is setting up his new work account and sets his password to password01 so he can easily remember it. What type of vulnerability did his password choice create? Zero-day Brute-force Default password Weak password

21.Which exploit includes using breaching the network cable and using a packet sniffer to listen and record the traffic on the network? Wiretapping ARP poisoning Port scanning Session hijacking

22.I have very little IT experience but decide to use an advanced hacking tool to perform a denial-of-service attack on banks network. What type of attacker would I be considered? Script kiddie Black Hat Insider threat White Hat

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Computer Network Questions!