Select the type of attack that was launched against Certkiller .com.

You work as the security administrator at Certkiller .com. You are busy auditing the Certkiller .com
wireless network. You find an unauthorized Access Point under the desk of a user named Amy
Walsh. Amy works in the Finance department. You confront Amy about this. Amy denies any
knowledge of the unauthorized Access Point. Amy informs you though that a new friend has
recently visited her, and on numerous occasions, at the company premises. Select the type of
attack that was launched against Certkiller .com.

You work as the security administrator at Certkiller .com. You are busy auditing the Certkiller .com
wireless network. You find an unauthorized Access Point under the desk of a user named Amy
Walsh. Amy works in the Finance department. You confront Amy about this. Amy denies any
knowledge of the unauthorized Access Point. Amy informs you though that a new friend has
recently visited her, and on numerous occasions, at the company premises. Select the type of
attack that was launched against Certkiller .com.

A.
A SYN flood attacks.

B.
A (DDos) Distributed Denial of Service attack.

C.
A man in the Middle attack.

D.
A TCP flood attack.

E.
IP Spoofing.

F.
Social Engineering

G.
A replay attack

H.
Phone tag

I.
Ahalloween attack

Explanation:
Social engineering is a process where an attacker attempts to acquire information about your
network and system by talking to people in the organization. A social engineering attack may
occur over the phone, be e-mail, or by a visit.
Incorrect answers:
A: A SYN flood, forces a victim system to use up one of its finite number of connections for each
connection the initiator opens.
B: Distributed denial of service attacks are multicell attacks.
C: A man-in-the-middle attack is commonly used to gather information in transit between two
hosts.
D: In this attack, the source system sends a flood of SYN requests and never sends the final ACK,
creating a half-open TCP session.
E: In IP Spoofing a hacker can impersonate a valid service by sourcing traffic using the service’s
IP address or name.
G: A replay attack is similar in part to a man-in-the-middle attack. In this instance, an attacker
intercepts traffic between two end points and retransmits or replays it later.
H: Phone tag is not the same as social engineering.
I: You are not a victim of a Halloween attack in this case.
References:
Mike Pastore and Emmett Dulaney, Security+ Study Guide, 2nd Edition, Alameda , Sybex, 2004, p
87
Todd Bill The Security+ Training Guide, Que Publishing, Indianapolis , 2003, Chapter 3



Leave a Reply 0

Your email address will not be published. Required fields are marked *