nerdexam
(ISC)2(ISC)2

CERTIFIED-IN-CYBERSECURITY · Question #569

CERTIFIED-IN-CYBERSECURITY Question #569: Real Exam Question with Answer & Explanation

The correct answer is A: On-path attack. In an on-path attack, hackers position themselves on the communication path between two parties, intercepting and possibly altering the communication. For example, a hacker could intercept communication between a user and a bank's server and redirect the user to a bogus Website w

Network Security

Question

What kind of attack is likely to occur when a hacker intercepts and redirects traffic by spoofing the IP address of a corporate server?

Options

  • AOn-path attack
  • BSpyware
  • CTrojan
  • DAdvanced persistent threat (APT)

Explanation

In an on-path attack, hackers position themselves on the communication path between two parties, intercepting and possibly altering the communication. For example, a hacker could intercept communication between a user and a bank's server and redirect the user to a bogus Website where the user unknowingly provides his or her login credentials. The other options are attacks that do not specifically require intercepting and redirecting communications. An Advanced Persistent Threat (APT) is a sustained and targeted cyberattack in which an unauthorized user gains access to a network and remains undetected for an extended period of time. A Trojan is malicious software that disguises itself as a normal file or program to trick users into downloading and installing malware on their systems. Finally, spyware is software that allows a user to obtain secret information about another's computer activity by covertly transferring data from their hard drive. Like a Trojan, it can be part of an attack, but doesn't involve intercepting and redirecting

Topics

#Network Attacks#On-path Attack#IP Spoofing#Man-in-the-Middle (MITM)

Community Discussion

No community discussion yet for this question.

Full CERTIFIED-IN-CYBERSECURITY PracticeBrowse All CERTIFIED-IN-CYBERSECURITY Questions