PrepAway - Latest Free Exam Questions & Answers

Which of the following types of cyber crimes involves this form of network attack?

Your Company is receiving false and abusive e-mails from the e-mail address of your partner company. When you complain, the partner company tells you that they have never sent any such e- mails. Which of the following types of cyber crimes involves this form of network attack?

PrepAway - Latest Free Exam Questions & Answers

A.
Cyber squatting

B.
Cyber Stalking

C.
Man-in-the-middle attack

D.
Spoofing

Explanation:
This type of network attack is called spoofing. Spoofing is a technique that makes a transmission appear to have come from an authentic
source by forging the IP address, email address, caller ID, etc. In IP spoofing, a hacker modifies packet headers by using someone else’s IP
address to hide his identity. However, spoofing cannot be used while surfing the Internet, chatting on-line, etc. because forging the source IP
address causes the responses to be misdirected.
Answer option A is incorrect. Cybersquatting (also known as domain squatting), according to the Anticybersquatting Consumer Protection Act, is registering, trafficking in, or using a domain name with bad intent to profit from the goodwill of a trademark belonging to someone else. The cybersquatter then offers to sell the domain to the person or company who owns a trademark contained within the name at an inflated price.
Answer option C is incorrect. Man-in-the-middle attacks occur when an attacker successfully inserts an intermediary software or program between two communicating hosts. The intermediary software or program allows attackers to listen to and modify the communication packets passing between the two hosts. The software intercepts the communication packets and then sends the information to the receiving host.
The receiving host responds to the software, presuming it to be the legitimate client. Answer option B is incorrect. Cyberstalking is the use of the Internet or other electronic means to stalk someone. It has been defined as the use of information and communications technology, particularly the Internet, by an individual or group of individuals, to harass another individual, group of individuals, or organization. The behavior includes false accusations, monitoring, the transmission of threats, identity theft, damage to data or equipment, the solicitation of minors for sexual purposes, and gathering information for harassment purposes.

One Comment on “Which of the following types of cyber crimes involves this form of network attack?


Leave a Reply