Live Virtual Machine Lab 10.1: Module 10 General Network Attacks
In which type of attack are the cache records manipulated for malicious purposes? [Choose all that apply]
DNS Poisoning ARP Spoofing
Which type of attack can be conducted to render a network device inaccessible? [Choose all that apply]
Ransomware attack Denial of Service attack
In __________________ a malicious user gains physical access to restricted area of the network.
Tailgaiting
Which type of attack misleads a user to connect to a malicious wireless access point?
Evil Twin
In a _________ attack, the user is misled by a caller that he is a network technician gathering personal information from the user.
Social Engineering