Initiating an attack against targeted businesses and organizations threat

Initiating an attack against targeted businesses and

This preview shows page 2 - 4 out of 5 pages.

Initiating an attack against targeted businesses and organizations, threat actors compromise a carefully selected website by inserting an exploit resulting in malware infection. The attackers run exploits on well-known and trusted sites likely to be visited by their targeted victims. Aside from carefully choosing sites to compromise, these attacks are known to incorporate zero-day exploits that target unpatched vulnerabilities. Thus, the targeted entities are left with little or no defense against these exploits. What type of attack is outlined in the scenario? A. Watering Hole Attack B. Heartbleed Attack C. Shellshock Attack D. Spear Phising Attack Answer: A Question: 4 You have successfully gained access to your client's internal network and succesfully comprised a linux server which is part of the internal IP network. You want to know which Microsoft Windows workstations have file sharing enabled. Which port would you see listening on these Windows machines in the network? A. 445 B. 3389 C. 161 D. 1433
Background image
Certification Preparation Material Page | 3 Answer: A Question: 5 It is a short-range wireless communication technology intended to replace the cables connecting portable of fixed devices while maintaining high levels of security. It allows mobile phones, computers and other devices to connect and communicate using a short-range wireless connection.
Background image
Image of page 4

You've reached the end of your free preview.

Want to read all 5 pages?

  • Winter '16
  • Niall Winters
  • http://www.certschief.comCertification Preparation Material, Host-based intrusion detection system, Intrusion detection system, Certified Ethical Hacker

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture