A threat actor uses non-blind spoofing to launch an attack. What are two objectives for the attack? (Choose two.)

IT Questions BankCategory: IoT SecurityA threat actor uses non-blind spoofing to launch an attack. What are two objectives for the attack? (Choose two.)

A threat actor uses non-blind spoofing to launch an attack. What are two objectives for the attack? (Choose two.)

  • depleting the batteries of IP-based IoT devices
  • flooding the network with maliciously formatted packets
  • overwhelming web servers
  • determining the state of a firewall
  • predicting TCP sequence-numbers

Explanation: IP address spoofing attacks occur when a threat actor creates packets with false source IP address information. With non-blind spoofing, the threat actor can see the traffic that is being sent between the host and the target. Reasons for non-blind spoofing include determining the state of a firewall, TCP sequence-number prediction, or hijacking an authorized session.

Exam with this question: IoT Security 1.1 Chapter 4 Quiz Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x