Questions
The following is a short list of review questions to help reinforce your learning and help you identify areas that may require some improvement:
- Which of the following types of attacks focuses on compromising the availability of a server?
A. On-path
B. Phishing
C. DDoS
D. All of the above
- Which type of network-based attack is needed to intercept communication between two or more devices?
A. VLAN hopping
B. On-path
C. DNS
D. DHCP
- Which of the following attack is needed for a MiTM attack to be successful?
A. Phishing
B. Rogue DHCP server
C. VLAN hopping
D. ARP poisoning
- Which of the following attacks best describes a hacker modifying the DNS cache on their victim’s system by sending fake DNS response messages?
A. DNS poisoning
B. DNS hijacking
C. DNS flooding
D. Domain hijacking
- Which of the following allows a hacker to gain unauthorized access to another VLAN on the...