An attacker is using a laptop as a rogue access point to capture all network traffic from a targeted user. Which type of attack is this?
- port redirection
- trust exploitation
- buffer overflow
- man in the middle
Explanation: An access attack tries to gain access to a resource using a hijacked account or other means. The five types of access attacks include the following:password – a dictionary is used for repeated login attempts
trust exploitation – uses granted privileges to access unauthorized material
port redirection – uses a compromised internal host to pass traffic through a firewall
man-in-the-middle – an unauthorized device positioned between two legitimate devices in order to redirect or capture traffic
buffer overflow – too much data sent to a memory location that already contains data
Exam with this question: CCNA Cyber Ops (v1.1) – Chapter 6 Exam Answers
Exam with this question: CCNA Security Chapter 1 Exam Answers
Exam with this question: CyberOps Associate (Version 1.0) - Module 16: Attacking the Foundation Quiz Answers
Exam with this question: CCNA Security Chapter 1 Exam (CCNAS v1.2)
Exam with this question: 3.4.2 Attacking the Foundation Quiz
Exam with this question: Endpoint Security: My Knowledge Check Answers
Please login or Register to submit your answer