- Get link
- X
- Other Apps
CYB 205 Infrastructure Administration
Q: Ann is a security professional for a midsize business and typically handles log analysis and security monitoring tasks for her organization. One of her roles is to monitor alerts originating from the organization's intrusion detection system. The system typically generates several dozen alerts each day, and many of those alerts turn out to be false alarms after her investigation. This morning, the intrusion detection system gave an alert because the network began to receive an unusual high volume of the inbound traffic. Ann received this alert and began looking into the origin of the .As Ann analyzes the traffic further, she realizes that the traffic is coming from many different sources and has overwhelmed the network, preventing legitimate uses. The inbound packets are responses to queries that she does not see in the outbound traffic. The responses are abnormally large for their type. What type of attack should Ann suspect?
A: Denial-of-service
Explanation: This is a clear example of a denial-of-service attack—denying legitimate users authorized access to the system through the use of overwhelming traffic. A denial-of-service (DoS) attack occurs when legitimate users are unable to access information systems, devices, or other network resources due to the actions of a malicious cyber threat actor.Answer C is incorrect. A phishing attack is a type of social engineering attack often used to steal user data, including login credentials and credit card numbers.Answer D is incorrect. A rainbow table attack is a type of hacking wherein the perpetrator tries to use a rainbow hash table to crack the passwords stored in a database system.Answer A is incorrect. A cryptanalysis attack that attempts to deduce the meaning of encrypted communications by looking for patterns in the sender and recipient address information, protocols, or packet types.
- Get link
- X
- Other Apps
Comments
Post a Comment