Skillset can help you prepare! Sign up for your free Skillset account and take the first steps towards your certification.
Katie, a malicious hacker, has setup a program to send thousands of Internet Control Message Protocol(ICMP) packets across the internal network, using Josh's spoofed IP address. When this occurs, Josh's computer receives thousands of responses, and is unable to access the network due to the packets coming in(like in a DDOS). This is an example of what kind of attack?
Salami Attack
Man In The Middle Attack
Trojan Horse
Smurf Attack
Logic Bomb
The Smurf Attack is a distributed denial-of-service attack in which large numbers of Internet Control Message Protocol (ICMP) packets with the intended victim's spoofed source IP are broadcast to a computer network using an IP Broadcast address."
The best example of a salami attack is on office space, when they take a fraction of a penny from all interest bearing accounts. This is a small repeatable crime that happens many times.
A man in the middle attack is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.
A logic bomb is a set of instructions secretly incorporated into a program so that if a particular condition is satisfied they will be carried out, usually with harmful effects.
And a Trojan Horse is an application or program that hides it's malicious nature until it's executed.
THIS DOES NOT BELONG IN THE PHYSICAL AND ENVIRONMENTAL SECTION
Study thousands of practice questions that organized by skills and ranked by difficulty.
Create a tailored training plan based on the knowledge you already possess.
Know when you’re ready for the high-stakes exam. Have the confidence that you will pass on your first attempt.