Which metric in CVSS indicates an attack that takes a destination bank account number and replaces it with a different bank account number?
A.
integrity
B.
confidentiality
C.
availability
D.
scope
integrity
How is attacking a vulnerability categorized?
A.
action on objectives
B.
delivery
C.
exploitation
D.
insta
exploitation
A security specialist notices 100 HTTP GET and POST requests for multiple pages on the web servers. The agent in the requests contains PHP code that, if executed, creates and
writes to a new PHP file on the webserver. Which event category is described?
A.
reconnaissance
B.
action on objectives
C.
installation
D.
exploitation
installation
Which type of attack occurs when an attacker is successful in eavesdropping on a
conversation between two
IP phones?
A.
known-plaintext
B.
replay
C.
dictionary
D.
man-in-the-middle
man-in-the-middle
What does cyber attribution identity in an investigation?
A.
cause of an attack
B.
exploit of an attack
C.
vulnerabilities exploited
D.
threat actors of an attack
threat actors of an attack
Page 9 out of 37 Pages |
Previous |