Question: Question 12 Cassidy has found a way to modify her target's DHCP server configuration. She decides to make a change that tells DHCP clients of

Question 12

Cassidy has found a way to modify her target's DHCP server configuration. She decides to make a change that tells DHCP clients of a web proxy configuration that will have browsers on those systems sending requests through a proxy server under her control where she can intercept, read, and relay HTTP/S traffic. Which if the following is she doing?

A. Sniffing
B. Malformed IP Packets
C. Denial of Service Attack
D. Man-in-the-Middle Attack

Question 13

Silas wants to enter his target's building, but the doors are locked. He decides to fill his arms with boxes and wait by the door, appearing like a co-worker with their arms full, hoping somebody will take pity on him and hold the door open so he can enter. This is an example of:

A. Splicing into a Cable
B. Man-in-the-Middle Attack
C. Social Distancing
D. Social Engineering

Question 14

Brooke turns on her recording of a crying baby, adjusting the volume so it sounds like it is in the next room. Then she calls her target's cellular phone provider and pretends to be his wife, trying to resolve a billing issue while dealing with a crying child. This is an example of:

A. Frame Sniffing
B. Social Engineering
C. Session Hijacking
D. SQL Injection

Question 15

Veer desires to compile a list of known vulnerabilities for open services available on the Marketing department's subnet. Which of the following tools would accomplish that?

A. Nessus
B. ping
C. Wireshark
D. nmap

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!