Live Virtual Machine Lab 10.1: Module 10 General Network Attacks

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

In which type of attack are the cache records manipulated for malicious purposes? [Choose all that apply]

DNS Poisoning ARP Spoofing

Which type of attack can be conducted to render a network device inaccessible? [Choose all that apply]

Ransomware attack Denial of Service attack

In __________________ a malicious user gains physical access to restricted area of the network.

Tailgaiting

Which type of attack misleads a user to connect to a malicious wireless access point?

Evil Twin

In a _________ attack, the user is misled by a caller that he is a network technician gathering personal information from the user.

Social Engineering


Ensembles d'études connexes

Strategic Management - Chapter 1, "What is strategy and the strategic management process?"

View Set

Ch. 17: Preoperative Nursing Management

View Set

Imaging Worksheets for Chapters 31, 32, and 33

View Set

Week 3: Chapter 8 - Supporting Your Ideas Assignment

View Set

PREPU: Chapter 27: Management of Patients W/Coronary Vascular Disorders

View Set