You work as a Network Administrator for uCertify Inc. You find that a malicious hacker is attempting to exploit the finite memory size of the company’s access point table so that the company employees cannot connect to the company’s access point. Which of the following attacks is being performed by the malicious hacker?

A.
Bit-flipping attack
B.
Bonk attack
C.
Association flood attack
D.
Man-in-the-middle attack
Explanation:
An association flood attack is the process of exploiting the finite memory size of the access point association table and flooding it with a number of associations through spoofing or by emulating wireless clients. Once this table is full, no further associations will be accepted by the access point, thus denying access for the legitimate clients. Answer option B is incorrect. Bonk attack is a variant of the teardrop attack that affects mostly Windows computers by sending corrupt UDP packets to DNS port 53. It is a type of denial-of-service (DoS) attack. A bonk attack manipulates a fragment offset field in TCP/IP packets. This field tells a computer how to reconstruct a packet that was fragmented, because it is difficult to transmit big packets. A bonk attack causes the target computer to reassemble a packet that is too big to be reassembled and causes the target computer to crash. Answer option A is incorrect. A bit-flipping attack is an attack on a cryptographic cipher in which the attacker can change the ciphertext in such a way as to result in a predictable change of the plaintext, although the attacker is not able to learn the plaintext itself. Note that this type of attack is not directly against the cipher itself (as cryptanalysis of it would be), but against a particular message or series of messages. In the extreme, this could become a Denial of service attack against all messages on a particular channel using that cipher.The attack is especially dangerous when the attacker knows the format of the message. In such a situation, the attacker can turn it into a similar message but one in which some important information is altered. For example, a change in the destination address might alter the message route in a way that will force re-encryption with a weaker cipher, thus possibly making it easier for an attacker to decipher the message. Answer option D is incorrect. Man-in-the-middle attacks occur when an attacker successfully inserts an intermediary software or program between two communicating hosts. The intermediary software or program allows attackers to listen to and modify the communication packets passing between the two hosts. The software intercepts the communication packets and then sends the information to the receiving host. The receiving host responds to the software, presuming it to be the legitimate client.
I agree with the answer. C
0
0