You work as the security administrator at Certkiller .com. You are busy auditing the Certkiller .com
wireless network. You find an unauthorized Access Point under the desk of a user named Amy
Walsh. Amy works in the Finance department. You confront Amy about this. Amy denies any
knowledge of the unauthorized Access Point. Amy informs you though that a new friend has
recently visited her, and on numerous occasions, at the company premises. Select the type of
attack that was launched against Certkiller .com.
A.
A SYN flood attacks.
B.
A (DDos) Distributed Denial of Service attack.
C.
A man in the Middle attack.
D.
A TCP flood attack.
E.
IP Spoofing.
F.
Social Engineering
G.
A replay attack
H.
Phone tag
I.
Ahalloween attack
Explanation:
Social engineering is a process where an attacker attempts to acquire information about your
network and system by talking to people in the organization. A social engineering attack may
occur over the phone, be e-mail, or by a visit.
Incorrect answers:
A: A SYN flood, forces a victim system to use up one of its finite number of connections for each
connection the initiator opens.
B: Distributed denial of service attacks are multicell attacks.
C: A man-in-the-middle attack is commonly used to gather information in transit between two
hosts.
D: In this attack, the source system sends a flood of SYN requests and never sends the final ACK,
creating a half-open TCP session.
E: In IP Spoofing a hacker can impersonate a valid service by sourcing traffic using the service’s
IP address or name.
G: A replay attack is similar in part to a man-in-the-middle attack. In this instance, an attacker
intercepts traffic between two end points and retransmits or replays it later.
H: Phone tag is not the same as social engineering.
I: You are not a victim of a Halloween attack in this case.
References:
Mike Pastore and Emmett Dulaney, Security+ Study Guide, 2nd Edition, Alameda , Sybex, 2004, p
87
Todd Bill The Security+ Training Guide, Que Publishing, Indianapolis , 2003, Chapter 3