Which two characteristics represent a blended threat? (Choose two.)
A.
man-in-the-middle attack
B.
trojan horse attack
C.
pharming attack
D.
denial of service attack
E.
day zero attack
Explanation:
http://www.cisco.com/web/IN/about/network/threat_defense.html
Rogue developers create such threats by using worms, viruses, or application-embedded attacks.Botnets can be used to seed an attack, for example, rogue developers can use worms or
application-embedded attacks, that is an attack that is hidden within application traffic such as web
traffic or peer-to-peer shared files, to deposit “Trojans”. This combination of attack techniques – a
virus or worm used to deposit a Trojan, for example-is relatively new and is known as a blended
attack. A blended attack can also occur in phases: an initial attack of a virus with a Trojan that
might open up an unsecured port on a computer, disable an access control list (ACL), or disarm
antivirus software, with the goal of a more devastating attack to follow soon after. Host Firewall on
servers and desktops/laptops, day zero protection & intelligent behavioral based protection from
application vulnerability and related flaws (within or inserted by virus, worms or Trojans) provided
great level of confidence on what is happening within an organization on a normal day and when
there is a attack situation, which segment and what has gone wrong and gives flexibility and
control to stop such situations by having linkages of such devices with monitoring, log-analysis
and event co-relation system.