Which attack technique might involve a seemingly trusted endpoint resolving as a Web site hosting malware?

A.
Password cracking
B.
Trojan horse
C.
Session hijacking
D.
UI redressing
Explanation:
Answer C is correct; session hijacking involves a combination of sniffing and spoofing in order for the attacker to masquerade as one or both ends of an established connection.Incorrect Answers and Explanations: A, B, and D: Answers A, B, and D are incorrect. Password cracking has little to do with which Web site is resolved. Though Trojan horse infections could, no doubt, have the ability to alter hosts tables, DNS settings, and other things that could cause this behavior, they are considered malware rather than an attack technique. Also the mention of trusted endpoint makes session hijacking the more likely answer. UI redressing is a simple distraction answer, and is the more generic term for what is known as clickjacking.
Session hijacking – to gain unauthorized access to information or services in a computer system.
How is this linked to be “Website hosting malware”?
0
0
session hijacking involves a combination of sniffing and spoofing in order for the attacker to masquerade as one or both ends of an established connection.
0
0
The answer can’t be C, should be B
0
0
My bad, I mean D clickjacking
0
0