A threat actor uses non-blind spoofing to launch an attack. What are two objectives for the attack? (Choose two.)
- depleting the batteries of IP-based IoT devices
- flooding the network with maliciously formatted packets
- overwhelming web servers
- determining the state of a firewall
- predicting TCP sequence-numbers
Explanation: IP address spoofing attacks occur when a threat actor creates packets with false source IP address information. With non-blind spoofing, the threat actor can see the traffic that is being sent between the host and the target. Reasons for non-blind spoofing include determining the state of a firewall, TCP sequence-number prediction, or hijacking an authorized session.
Exam with this question: IoT Security 1.1 Chapter 4 Quiz Answers