Which two statements describe access attacks? (Choose two.)

IT Questions BankCategory: CCNA CyberOpsWhich two statements describe access attacks? (Choose two.)

Which two statements describe access attacks? (Choose two.)

  • Password attacks can be implemented by the use of brute-force attack methods, Trojan horses, or packet sniffers.
  • To detect listening services, port scanning attacks scan a range of TCP or UDP port numbers on a host.
  • Port redirection attacks use a network adapter card in promiscuous mode to capture all network packets that are sent across a LAN.
  • Trust exploitation attacks often involve the use of a laptop to act as a rogue access point to capture and copy all network traffic in a public location, such as a wireless hotspot.
  • Buffer overflow attacks write data beyond the allocated buffer memory to overwrite valid data or to exploit systems to execute malicious code.

Explanation: An access attack tries to gain access to a resource using a hijacked account or other means. The five types of access attacks include the following:
password - a dictionary is used for repeated login attempts
trust exploitation - uses granted privileges to access unauthorized material
port redirection - uses a compromised internal host to pass traffic through a firewall
man-in-the-middle - an unauthorized device positioned between two legitimate devices in order to redirect or capture traffic
buffer overflow - too much data sent to a memory location that already contains data

Exam with this question: CyberOps Associate (Version 1.0) - CyberOps Associate 1.0 Practice Final exam
Exam with this question: CCNA Cyber Ops Final Exam Answers
Exam with this question: CCNA Security Chapter 1 Exam Answers
Exam with this question: Module 2: Quiz – Network Threats Network Security
Exam with this question: CCNA Security Chapter 1 Exam (CCNAS v1.2)

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments