A threat actor constructs IP packets that appear to come from a valid source within the corporate network. What type of attack is this?
- eavesdropping
- password-based
- MiTM
- IP address spoofing
Explanation: A threat actor uses a tool to construct IP packets that appear to come from a valid source within the corporate network. This is an example of IP address spoofing.
Exam with this question: 2.2.4 Check Your Understanding - Classify Cyber Attacks
Exam with this question: 13.2.4 Check Your Understanding - Classify Cyber Attacks
Please login or Register to submit your answer