1. Which attack is being used when threat actors position themselves between a source and destination to transparently monitor, capture, and control the communication?
- Address Spoofing Attack
- Amplification and Reflection Attacks
- ICMP Attack
- MiTM Attack
- Session Hijacking
2. Which attack is being used when threat actors gain access to the physical network, and then use an MiTM attack to capture and manipulate a legitimate user’s traffic?
- Address Spoofing Attack
- Amplification and Reflection Attacks
- ICMP Attack
- MiTM Attack
- Session Hijacking
3. Which attack is being used when threat actors initiate a simultaneous, coordinated attack from multiple source machines?
- Address Spoofing Attack
- Amplification and Reflection Attacks
- ICMP Attack
- MiTM Attack
- Session Hijacking
4. Which attack is being used when threat actors use pings to discover subnets and hosts on a protected network, to generate flood attacks, and to alter host routing tables?
- Address Spoofing Attack
- Amplification and Reflection Attacks
- ICMP Attack
- MiTM Attack
- Session Hijacking
5. Which attack being used is when a threat actor creates packets with false source IP address information to either hide the identity of the sender, or to pose as another legitimate user?
- Address Spoofing Attack
- Amplification and Reflection Attacks
- ICMP Attack
- MiTM Attack
- Session Hijacking