1. Hackers have gained access to account information and can now login into a system with the same rights as authorized users. What type of attack is this?
- compromised key
- password-based
- DoS
- social engineering
2. In what type of attack can threat actors change the data in packets without the knowledge of the sender or receiver?
- eavesdropping
- denial of service
- data modification
- IP address spoofing
3. Threat actors have positioned themselves between a source and destination to monitor, capture, and control communications without the knowledge of network users. What type of attack is this?
- MiTM
- eavesdropping
- DoS
- IP address spoofing
4. A threat actor has gained access to encryption keys that will permit them to read confidential information. What type of attack is this?
- eavesdropping
- man-in-the-middle
- password-based
- compromised key
5. In what type of attack does a threat attacker attach to the network and read communications from network users?
- data modification
- eavesdropping
- denial of service
- password-based
6. A threat actor constructs IP packets that appear to come from a valid source within the corporate network. What type of attack is this?
- eavesdropping
- password-based
- MiTM
- IP address spoofing
7. What type of attack prevents the normal use of a computer or network by valid users?
- DoS
- password-based
- MiTM
- IP address spoofing