CERTIFIED-IN-CYBERSECURITY · Question #569
CERTIFIED-IN-CYBERSECURITY Question #569: Real Exam Question with Answer & Explanation
The correct answer is A: On-path attack. In an on-path attack, hackers position themselves on the communication path between two parties, intercepting and possibly altering the communication. For example, a hacker could intercept communication between a user and a bank's server and redirect the user to a bogus Website w
Question
What kind of attack is likely to occur when a hacker intercepts and redirects traffic by spoofing the IP address of a corporate server?
Options
- AOn-path attack
- BSpyware
- CTrojan
- DAdvanced persistent threat (APT)
Explanation
In an on-path attack, hackers position themselves on the communication path between two parties, intercepting and possibly altering the communication. For example, a hacker could intercept communication between a user and a bank's server and redirect the user to a bogus Website where the user unknowingly provides his or her login credentials. The other options are attacks that do not specifically require intercepting and redirecting communications. An Advanced Persistent Threat (APT) is a sustained and targeted cyberattack in which an unauthorized user gains access to a network and remains undetected for an extended period of time. A Trojan is malicious software that disguises itself as a normal file or program to trick users into downloading and installing malware on their systems. Finally, spyware is software that allows a user to obtain secret information about another's computer activity by covertly transferring data from their hard drive. Like a Trojan, it can be part of an attack, but doesn't involve intercepting and redirecting
Topics
Community Discussion
No community discussion yet for this question.