- Get link
- X
- Other Apps
CYB 205 Infrastructure Administration
Q: At a murder crime scene, a laptop is found which is password protected. The investigation team has hired a hacker to access the laptop to get all the relevant information of the deceased. The hacker is trying to access the laptop by systematically entering every word/phrase as a password. Which type of attack does this describe?
A: Dictionary
Explanation: This describes a dictionary attack, which is a systematic method of guessing a password by trying many common words/phrases and their simple variations.Answer C is incorrect. Data exfiltration is the unauthorized transfer of data from a computer.Answer A is incorrect. A man-in-the-middle (MITM) attack can happen when a third party can place themselves between the two nodes and either insert their own false traffic or modify traffic being exchanged between the two nodes, to fool one or both nodes into mistaking the third party for the other (legitimate) node.Answer D is incorrect. A denial-of-service (DoS) attack occurs when legitimate users are unable to access information systems, devices, or other network resources due to the actions of a malicious cyber threat actor
- Get link
- X
- Other Apps
Comments
Post a Comment