PrepAway - Latest Free Exam Questions & Answers

One Comment on “Which of the following is described as an attack against an application using a malicious file?

  1. meac says:

    Not a very well constructed question, which casts a very wide net. Thakfylly the answers narrow down the options to a single type of attack.
    The key word is here is a “malicious file”.
    B, C and D are in fact “malicous emails”. Receiving a Spam, Impersonation attack and /or Phishing attack will not directly compromise any application if the emails are not acted upon. Furthermore, B, C and D are EMAIL based threats.

    So the only possible answer is A.Client side attack

    DEFINITION of “Client Side attacks”:
    • Allows an attacker to execute scripts in the victim’s web browser.
    • This attack is used to intercept user sessions, deface websites, insert hostile content, conduct phishing attacks, and take over the user’s browser by using scripting malware.
    • All web application frameworks are vulnerable to this exploit.
    • Client side attack are attacks that target vulnerabilities in client applications that interact with a malicious server or process malicious data. They are BROWSER/INTERNET based

    In this Question, a malicious file is used to attack an application.
    If the application is running on a client computer, this would be a client side attack.
    Attacking a service or application on a server would be a server side attack.
    Client-side attacks target vulnerabilities in client applications interacting with a malicious data.
    The difference is the client is the one initiating the bad connection.
    Client-side attacks are becoming more popular. This is because server side attacks are not as easy as they once were according to apache.org.
    Attackers are finding success going after weaknesses in desktop applications such as browsers, media players, common office applications and e-mail clients.
    To defend against client-side attacks keep-up the most current application patch levels, keep antivirus software updated and keep authorized software to a minimum.




    0



    0

Leave a Reply