Questions
The following is a short list of review questions to help reinforce your learning and help you identify areas that require some improvement. The answers to these questions can be found in the Assessments section at the end of this book:
- An attacker is attempting to prevent users from the IT department from accessing the SSH service on a server. Which type of attack is the threat actor performing?
A. Command injection
B. Protocol-based
C. XSS
D. Watering hole
- An attacker is connected to the victim machine and the rest of the network. The intention of the attacker is to capture passwords that are sent in plain text through the network. Which type of attack is this?
A. MITM
B. Protocol-based
C. Phishing
D. Buffer overflow
- Which type of attack allows an attacker to steal cookies from anyone that visits a compromised website?
A. MITM
B. Phishing
C. Watering hole
D. XSS
- Which of the following attacks is designed to target the high-profile employees of an organization?
A...