Threats and Vulnerabilities
SKILLSET
No description available
Related Questions
- Zombies connect together to form a network and launch an attack. This network is called:
- A tool used by security professionals to check the strength of a password is called ____________.
- Which of the following descriptions best help define the Web based attack, 'Username enumeration'
- When an attacker attempts to load arbitrary code into a browser in order to steal data from other frames present in the browser session is called______________.
- Key company officers received an email prompting them for critical company information in an official-sounding email. What type of social engineering would this be classified as?
- Social engineering is an attack against people to gain access to their information or to their systems. Which type of social engineering would BEST fit an example of an attacker who attacks a local server to redirect queries from the real site to a fake site run by the attacker?
- Many hackers join together to ping a server in order to take the server down. Which of the principles of security is compromised because of this?
- Which of the following is NOT included when login control features are given preference?
- A user has spoofed their IP address with that of a web server. They then ping a large number of other computers. What is their intent?
- During a social engineering attack, a hacker attempts to manipulate a(n) ___ person to gain access to secure resources.