Which attack is being used when threat actors gain access to the physical network, and then use an MiTM attack to capture and manipulate a legitimate user’s traffic?
- Address Spoofing Attack
- Amplification and Reflection Attacks
- ICMP Attack
- MiTM Attack
- Session Hijacking
Explanation: A session hijacking attack is when threat actors gain access to the physical network, and then use an MiTM attack to capture and manipulate traffic, hijacking a legitimate user’s session.
Exam with this question: 3.6.7 Check Your Understanding - IP Vulnerabilities and Threats
Exam with this question: 16.2.6 Check Your Understanding - IP Vulnerabilities and Threats
Please login or Register to submit your answer