13.2.4 Check Your Understanding – Classify Cyber Attacks Answers

1. Hackers have gained access to account information and can now login into a system with the same rights as authorized users. What type of attack is this?

  • compromised key
  • password-based
  • DoS
  • social engineering

Explanation: A password-based attack can occur when threat actors have gained access to user account information that allows them to access a system like authorized users.

2. In what type of attack can threat actors change the data in packets without the knowledge of the sender or receiver?

  • eavesdropping
  • denial of service
  • data modification
  • IP address spoofing

Explanation: In data modification attacks, threat actors alter the contents of legitimate messages without the knowledge of the sender or receiver.

3. Threat actors have positioned themselves between a source and destination to monitor, capture, and control communications without the knowledge of network users. What type of attack is this?

  • MiTM
  • eavesdropping
  • DoS
  • IP address spoofing

Explanation: In man-in-the-middle (MiTM) attacks, a threat actor causes network traffic to pass through his computer. The traffic is then forwarded on as usual. The threat actor can then access then read and analyze the traffic for valuable information.

4. A threat actor has gained access to encryption keys that will permit them to read confidential information. What type of attack is this?

  • eavesdropping
  • man-in-the-middle
  • password-based
  • compromised key

Explanation: When encryption keys are stolen and use to decrypt private communications, a compromised-key attack has occurred.

5. In what type of attack does a threat attacker attach to the network and read communications from network users?

  • data modification
  • eavesdropping
  • denial of service
  • password-based

Explanation: A threat actor has attached to the network and uses a sniffer to read the contents onf network traffic. This is an eavesdropping attack.

6. A threat actor constructs IP packets that appear to come from a valid source within the corporate network. What type of attack is this?

  • eavesdropping
  • password-based
  • MiTM
  • IP address spoofing

Explanation: A threat actor uses a tool to construct IP packets that appear to come from a valid source within the corporate network. This is an example of IP address spoofing.

7. What type of attack prevents the normal use of a computer or network by valid users?

  • DoS
  • password-based
  • MiTM
  • IP address spoofing

Explanation: A denial of service (DoS) attack uses fake traffic to prevent legitimate users to access a network or system.

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments