This type of vulnerability enables the intruder to re-route data traffic from a network device to a
personal machine? This diversion enables the intruder to capture data traffic to and from the
devices for analysis or modification, or to steal the password file from the server and gain access
to user accounts.

A.
Network Address Translation
B.
Network Address Hijacking
C.
Network Address Supernetting
D.
Network Address Sniffing
Explanation:
“Network Address Hijacking. It might be possible for an intruder to reroute data
traffic from a server or network device to a personal machine, either by device address
modification or network address “hijacking.” This diversion enables the intruder to capture traffic to
and from the devices for data analysis or modification or to steal the password file from the server
and gain access to user accounts. By rerouting the data output, the intruder can obtain
supervisory terminal functions and bypass the system logs.”Pg. 324 Krutz: The CISSP Prep Guide: Gold Edition
check
0
0
This is an outdated question stolen from our quiz engine.
Get the real version and the latest questions at http://www.freepracticetests.org
0
0