Live Virtual Machine Lab 10.1: Module 10 General Network Attacks
In which type of attack are the cache records manipulated for malicious purposes? [Choose all that apply]
DNS poisoning ARP spoofing
Which type of attack misleads a user to connect to a malicious wireless access point?
Evil Twin
Which type of attack can be conducted to render a network device inaccessible? [Choose all that apply]
Denial of Service attack Ransomware
In a _________ attack, the user is misled by a caller that he is a network technician gathering personal information from the user.
Social Engineering
In __________________ a malicious user gains physical access to restricted area of the network.
Tailgating