Question: Question 12 Cassidy has found a way to modify her target's DHCP server configuration. She decides to make a change that tells DHCP clients of
Question 12
Cassidy has found a way to modify her target's DHCP server configuration. She decides to make a change that tells DHCP clients of a web proxy configuration that will have browsers on those systems sending requests through a proxy server under her control where she can intercept, read, and relay HTTP/S traffic. Which if the following is she doing?
| A. | Sniffing |
| B. | Malformed IP Packets |
| C. | Denial of Service Attack |
| D. | Man-in-the-Middle Attack |
Question 13
Silas wants to enter his target's building, but the doors are locked. He decides to fill his arms with boxes and wait by the door, appearing like a co-worker with their arms full, hoping somebody will take pity on him and hold the door open so he can enter. This is an example of:
| A. | Splicing into a Cable |
| B. | Man-in-the-Middle Attack |
| C. | Social Distancing |
| D. | Social Engineering |
Question 14
Brooke turns on her recording of a crying baby, adjusting the volume so it sounds like it is in the next room. Then she calls her target's cellular phone provider and pretends to be his wife, trying to resolve a billing issue while dealing with a crying child. This is an example of:
| A. | Frame Sniffing |
| B. | Social Engineering |
| C. | Session Hijacking |
| D. | SQL Injection |
Question 15
Veer desires to compile a list of known vulnerabilities for open services available on the Marketing department's subnet. Which of the following tools would accomplish that?
| A. | Nessus |
| B. | ping |
| C. | Wireshark |
| D. | nmap |
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
