Which two characteristics represent a blended threat? (Choose two.)
A.
man-in-the-middle attack
B.
trojan horse attack
C.
pharming attack
D.
denial of service attack
E.
day zero attack
Explanation:
http://www.cisco.com/web/IN/about/network/threat_defense.html
Rogue developers create such threats by using worms, viruses, or application-embedded attacks.
Botnets can be used to seed an attack, for example, rogue developers can use worms or applicationembedded attacks, that is an attack that is hidden within application traffic such as web traffic or
peer-to-peer shared files, to deposit “Trojans”. This combination of attack techniques – a virus or
worm used to deposit a Trojan, for example-is relatively new and is known as a blended attack. A
blended attack can also occur in phases: an initial attack of a virus with a Trojan that might open up
an unsecured port on a computer, disable an access control list (ACL), or disarm antivirus software,with the goal of a more devastating attack to follow soon after. Host Firewall on servers and
desktops/laptops, day zero protection & intelligent behavioral based protection from application
vulnerability and related flaws (within or inserted by virus, worms or Trojans) provided great level of
confidence on what is happening within an organization on a normal day and when there is a attack
situation, which segment and what has gone wrong and gives flexibility and control to stop such
situations by having linkages of such devices with monitoring, log-analysis and event co-relation
system.