PrepAway - Latest Free Exam Questions & Answers

Which of the following types of attack is used to configure a computer to behave as another computer on a trus

Which of the following types of attack is used to configure a computer to behave as another
computer on a trusted network by using the IP address or the physical address?

PrepAway - Latest Free Exam Questions & Answers

A.
Distributed denial of service (DDOS) attack

B.
Honeypot

C.
RIP/SAP Spoofing

D.
Identity spoofing

Explanation:
Identity spoofing (IP address spoofing) will occur when the attacker wants to use an IP address of a
network, computer, or network component without being authorized for this task. It allows the
unprivileged code to use someone else’s identity, and use their security credentials

Answer B is incorrect. A honey pot is a computer that is used to attract potential intruders or
attackers. It is for this reason that a honey pot has low security permissions. A honey pot is used to
gain information about the intruders and their attack strategies.

Answer C is incorrect. RIP and SAP are used to broadcast network information in a regular way
regardless of no changes in the routing or service tables. RIP/SAP spoofing method is used to
intercept the SAP and RIP broadcasts by using a spoofing modem/router, and then re-broadcast
network information via its own routing table or service table.

Answer A is incorrect. In the distributed denial of service (DDOS) attack, an attacker uses multiple
computers throughout the network that it has previously infected. Such computers act as zombies
and work together to send out bogus messages, thereby increasing the amount of phony traffic. The
major advantages to an attacker of using a distributed denial-of-service attack are that multiple
machines can generate more attack traffic than one machine, multiple attack machines are harder to
turn off than one attack machine, and that the behavior of each attack machine can be stealthier,
making it harder to track down and shut down. TFN, TRIN00, etc. are tools used for the DDoS attack.


Leave a Reply