Which type of attack utilizes an unauthorized service or daemon running on your system to send out …

Which type of attack utilizes an unauthorized service or daemon running on your system to send out information to a hacker that can be used to further compromise the system?

Which type of attack utilizes an unauthorized service or daemon running on your system to send out information to a hacker that can be used to further compromise the system?

A.
Virus attack

B.
Hijacking attack

C.
Man-in-the-middle attack

D.
Illicit server attack

Explanation:
An illicit server attack is when you have an unauthorized service or daemon running on the system that can cause harm.
Incorrect Answers:
1D0-470
A: A virus attack is when a program or macro is executed and the virus is implanted into another executable. A virus can be used to implant the code for the illicit server attack, but the actual illicit server attack is when the service or daemon is running.
B: A hijacking attack is when someone gets in the middle of a transaction and takes over the transaction, spoofing himself as the original transaction partner.
C: A man-in-the-middle attack is also when someone gets in the middle of a transaction between two servers and intercepts the transaction flow. This differs slightly from the hijacking attack. In the hijacking attack the man-in-the-middle actually cuts in and impersonates one the partners, but in a man-in-the-middle attack, the intervening party only eavesdrops and listens to the stream.



Leave a Reply 0

Your email address will not be published. Required fields are marked *