A threat actor constructs IP packets that appear to come from a valid source within the corporate network. What type of attack is this?

IT Questions BankCategory: CyberOps AssociateA threat actor constructs IP packets that appear to come from a valid source within the corporate network. What type of attack is this?

A threat actor constructs IP packets that appear to come from a valid source within the corporate network. What type of attack is this?

  • eavesdropping
  • password-based
  • MiTM
  • IP address spoofing

Explanation: A threat actor uses a tool to construct IP packets that appear to come from a valid source within the corporate network. This is an example of IP address spoofing.

Exam with this question: 2.2.4 Check Your Understanding - Classify Cyber Attacks
Exam with this question: 13.2.4 Check Your Understanding - Classify Cyber Attacks

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments