PrepAway - Latest Free Exam Questions & Answers

Which of the following types of attacks is performed by Adam?

Which of the following types of attacks is performed by Adam?

PrepAway - Latest Free Exam Questions & Answers

A.
Man-in-the-middle attack

B.
Reverse social engineering attack

C.
DDoS attack that involves flooding a network or system

D.
DoS attack that involves crashing a network or system

Explanation:
Adam performed DoS attack, which involves crashing a network or system. A Denial-of-Service (DoS) attack is mounted with the objective of causing a negative impact on the performance of a computer or network. It is also known as a network saturation attack orbandwidth consumption attack. Attackers perform DoS attacks by sending a large number of protocol packets to the network. The effects of a DoS attack are as follows:
Saturates network resources Disrupts connections between two computers, thereby preventing communications between services Disrupts services to a specific computer Causes failure to access a Web site Results in an increase in the amount of spam A Denial-of- Service attack is very common on the Internet because it is much easier to accomplish. Most of the DoS attacks rely on the weaknesses in the TCP/IP protocol.

Answer option C is incorrect. In a distributed denial of service (DDOS) attack, an attacker uses multiple computers throughout the network that has been previously infected. Such computers act as zombies and work together to send out bogus
messages, thereby increasing the amount of phony traffic. The major advantages to an attacker of using a distributed denial-of-service attack are that multiple machines can generate more attack traffic than one machine, multiple attack machines are harder to turn off than one attack machine, and that the behavior of each attack machine can be stealthier, making it harder to track down and shut down. TFN, TRIN00, etc.
are tools used for a DDoS attack. Answer option A is incorrect. Man-in-the-middle attacks occur when an attacker successfully inserts an intermediary software or program between two communicating hosts. The intermediary software or program allows attackers to listen to and modify the communication packets passing between the two hosts. The software intercepts the communication packets and then sends the
information to the receiving host. The receiving host responds to the software, presuming it to be the legitimate client. Answer option B is incorrect. A reverse social engineering attack is a person- to-person attack in which an attacker convinces the target that he or she has a problem or might have a certain problem in the future and that he, the attacker, is ready to help solve the problem. Reverse social engineering is performed through the following steps: An attacker first damages the target’s equipment. He next advertises himself as a person of authority, ably skilled in solving that problem. In this step, he gains the trust of the target and obtains access to sensitive information. If this reverse social engineering is performed well enough to convince the target, he often calls the attacker and asks for help. Reference: http://www.us-cert.gov/cas/tips/ST04-015.html


Leave a Reply