Which of the following attacks can be overcome by applying cryptography?

Which of the following attacks can be overcome by applying cryptography?

Which of the following attacks can be overcome by applying cryptography?

A.
Web ripping

B.
DoS

C.
Sniffing

D.
Buffer overflow

Explanation:

If you send encrypted data packets, sniffers cannot read the data in the plaintext form.
Hence, this attack can be overcome by applying
encryption. Majority of the network communications occur in unsecured format. This allows an
attacker, who has gained access to data paths
in your network, to interpret (read) data traffic. This eavesdropping on your communications is
referred to as sniffing or snooping.
Answer option D is incorrect. Buffer overflow is a condition in which an application receives more
data than it is configured to accept. It helps
an attacker not only to execute a malicious code on the target system but also to install backdoors
on the target system for further attacks.
All buffer overflow attacks are due to only sloppy programming or poor memory management by
the application developers. The main types of
buffer overflows are:
Stack overflow
Format string overflow
Heap overflow
Integer overflow
Answer option A is incorrect. Web ripping is a technique in which the attacker copies the whole
structure of a Web site to the local disk and
obtains all files of the Web site. Web ripping helps an attacker to trace the loopholes of the Web
site.
Answer option B is incorrect. A Denial-of-Service (DoS) attack is mounted with the objective of
causing a negative impact on the performance
of a computer or network. It is also known as network saturation attack or bandwidth consumption
attack. Attackers make Denial-of-Service
attacks by sending a large number of protocol packets to a network.



Leave a Reply 0

Your email address will not be published. Required fields are marked *