PrepAway - Latest Free Exam Questions & Answers

Which attack technique might involve a seemingly trusted endpoint resolving as a Web site hosting malware?

Which attack technique might involve a seemingly trusted endpoint resolving as a Web site hosting malware?

PrepAway - Latest Free Exam Questions & Answers

A.
Password cracking

B.
Trojan horse

C.
Session hijacking

D.
UI redressing

Explanation:
Answer C is correct; session hijacking involves a combination of sniffing and spoofing in order for the attacker to masquerade as one or both ends of an established connection.

Incorrect Answers and Explanations: A, B, and D: Answers A, B, and D are incorrect. Password cracking has little to do with which Web site is resolved. Though Trojan horse infections could, no doubt, have the ability to alter hosts tables, DNS settings, and other things that could cause this behavior, they are considered malware rather than an attack technique. Also the mention of trusted endpoint makes session hijacking the more likely answer. UI redressing is a simple distraction answer, and is the more generic term for what is known as clickjacking.

4 Comments on “Which attack technique might involve a seemingly trusted endpoint resolving as a Web site hosting malware?


Leave a Reply