Which of the following types of attack is used to configure a computer to behave as another computer on a trusted network by using the IP address or the physical address?

Which of the following types of attack is used to configure a computer to behave as another
computer on a trusted network by using the IP address or the physical address?

Which of the following types of attack is used to configure a computer to behave as another
computer on a trusted network by using the IP address or the physical address?

A.
Distributed denial of service (DDOS) attack

B.
Honeypot

C.
RIP/SAP Spoofing

D.
Identity spoofing

Explanation:
Identity spoofing (IP address spoofing) will occur when the attacker wants to use an IP address of a
network, computer, or network component without being authorized for this task. It allows the
unprivileged code to use someone else’s identity, and use their security credentials
attackers. It is for this reason that a honey pot has low security permissions. A honey pot is used to
gain information about the intruders and their attack strategies.
regardless of no changes in the routing or service tables. RIP/SAP spoofing method is used to
intercept the SAP and RIP broadcasts by using a spoofing modem/router, and then re-broadcast
network information via its own routing table or service table.
computers throughout the network that it has previously infected. Such computers act as zombies
and work together to send out bogus messages, thereby increasing the amount of phony traffic. The
major advantages to an attacker of using a distributed denial-of-service attack are that multiple
machines can generate more attack traffic than one machine, multiple attack machines are harder to
turn off than one attack machine, and that the behavior of each attack machine can be stealthier,
making it harder to track down and shut down. TFN, TRIN00, etc. are tools used for the DDoS attack.



Leave a Reply 0

Your email address will not be published. Required fields are marked *