
642 -531
Leading the way in IT testing and certification tools, www.testking.com
- 6 -
Topic 1, Describe and explain the various intrusion
detection technologies and evasive techniques (17
questions)
Section 1: Define intrusion detection (7 questions)
QUESTION NO: 1
Which of the following types of attacks is typical of an intruder who is targeting
networks of systems in an effort to retrieve data of enhance their privileges?
A. Access attack
B. Denial of Service attack
C. Man in the middle attack
D. Authorization attack
E. Reconnaissance attack
Answer: A
Access Attacks
Access is a broad term used to describe any attack that requires the intruder to gain
unauthorized
access to a secure system with the intent to manipulate data, elevate privileges,
or simply access the system. The term “access attack” is used to describe any attempt to
gain system access, perform data manipulation, or elevate privileges.
System Access Attacks System access is the act of gaining unauthorized access to
a system for which the attacker doesn’t have a user account. Hackers usually gain access
to a device by running a script or a hacking tool, or exploiting a known vulnerability of
an application or service running on the host.
Data Manipulation Access Attacks Data manipulation occurs when an intruder
simply reads, copies, writes, deletes, or changes data that isn’t intended to be accessible
by the intruder. This could be as simple as finding a share on a Windows 9x or
NT computer, or as difficult as attempting to gain access to a credit bureau’s information,
or breaking into the department of motor vehicles to change a driving record.
Elevating Privileges Access Attacks Elevating privileges is a common type
of attack. By elevating privileges an intruder can gain access to files, folders or application
data that the user account was not initially granted access to. Once the hacker has
gained a high-enough level of access, they can install applications, such as backdoors and
Trojan horses, to allow further access and reconnaissance. A common goal of hackers is to
CCSP: Cisco Certified Security Professional Certification All-in-One Exam Guide
Cisco Courseware 13-6
Komentarze do niniejszej Instrukcji