Which type of hacking attack occurred?

Kerstin connected to an e-commerce site and brought a new mouse pad with her credit card for $5.00 plus shipping and handling. She never received her mouse pad so she called her credit card company to cancel the transaction. She was not charged for the mouse pad, but she received multiple charges she knew nothing about. She tried to connect to the site again but could not find it. Which type of hacking attack occurred?

Kerstin connected to an e-commerce site and brought a new mouse pad with her credit card for $5.00 plus shipping and handling. She never received her mouse pad so she called her credit card company to cancel the transaction. She was not charged for the mouse pad, but she received multiple charges she knew nothing about. She tried to connect to the site again but could not find it. Which type of hacking attack occurred?

A.
Denial-of-service attack

B.
Hijacking attack

C.
Illicit server attack

D.
Spoofing attack

Explanation:
This is a form of the man in the middle attack, where the hacker gathers the data and acts as one of the legitimate parties to the transaction.
Incorrect Answers:
A: A denial-of-service attack involves flooding a node so that the node cannot respond to other requests.
C: For this type of attack, Kerstin would have actually contacted the real e-commerce server, but code on that server would have been modified or replaced. Since Kerstin 1D0-470
cannot locate the server anymore, this indicates that the transaction was with a rouge server.
D: Spoofing is most likely required in order to impersonate the e-commerce server, by spoofing the destination address. However, the e-commerce attack could also be done using other means to intercept the transaction, such as poisoning a DSN server. So, although spoofing can be used, it does not mean that spoofing was actually used.



Leave a Reply 0

Your email address will not be published. Required fields are marked *