Mod 10 Mindtap Questions
In which type of attack are the cache records manipulated for malicious purposes? [Choose all that apply] ARP Spoofing Shoulder Surfing Denial of Service attack DNS Poisoning Ransomware attack
ARP Spoofing DNS Poisoning
Which type of attack can be conducted to render a network device inaccessible? [Choose all that apply] Man-in-the-middle attack VLAN Hopping Denial of Service attack Ransomware attack Shoulder Surfing
Denial of Service attack Ransomware attack
Which type of attack misleads a user to connect to a malicious wireless access point? Evil Twin IP Spoofing Phishing MAC Spoofing ARP Spoofing
Evil Twin
In a _________ attack, the user is misled by a caller that he is a network technician gathering personal information from the user. Denial of Service attack DNS Poisoning ARP Spoofing Malware Social Engineering
Social Engineering
In __________________ a malicious user gains physical access to restricted area of the network. Tailgaiting Phishing On-path attack Shoulder surfing
Tailgaiting