Cisco IDS-4230-FE - Intrusion Detection Sys Fast Ethernet Sensor Arkusz Danych Strona 7

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 168
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 6
642 -531
Leading the way in IT testing and certification tools, www.testking.com
- 7 -
QUESTION NO: 2
Which of the following types of attacks would be a most probable consequence of the
presence of a shared folder in a Windows operating system?
A. Denial of Service Attack
B. Access Attack
C. Authorization attack
D. Reconnaissance attack
E. Man-in-the-middle
Answer: B
Explanation:
Access Attacks
Access is a broad term used to describe any attack that requires the intruder to gain
unauthorized access to a secure system with the intent to manipulate data, elevate privileges,
or simply access the system. The term “access attack” is used to describe any attempt to gain
system access, perform data manipulation, or elevate privileges.
System Access Attacks System access is the act of gaining unauthorized access to a system
for which the attacker doesn’t have a user account. Hackers usually gain access to a device by
running a script or a hacking tool, or exploiting a known vulnerability of an application or
service running on the host.
Data Manipulation Access Attacks Data manipulation occurs when an intruder simply
reads, copies, writes, deletes, or changes data that isn’t intended to be accessible by the
intruder. This could be as simple as finding a share on a Windows 9x or NT computer, or
as difficult as attempting to gain access to a credit bureau’s information, or breaking into the
department of motor vehicles to change a driving record.
Reference:
CCSP Osborne page 810
Cisco Courseware 3-6
QUESTION NO: 3
Which of the following represents a type of exploit that involves introducing programs
that install in inconspicuous back door to gain unauthorized access?
A. File sharing
B. Trojan horse
C. Protocol weakness
D. Session hijack
Answer: B
Explanation:
To gain remote access, they rely on keystroke capture software that's planted on a system,
sometimes through a worm or Trojan horse disguised as a game or screen saver.
Reference:
Cisco Courseware 2-46
Przeglądanie stron 6
1 2 3 4 5 6 7 8 9 10 11 12 ... 167 168

Komentarze do niniejszej Instrukcji

Brak uwag