After attending a security conference, your manager wants you to perform research on types of attacks whereby the attacker reuses an attack that has worked on other organizations. It is very important to your manager that you learn as much about this type of attack as possible. What is this type of attack called?
A. birthday attack
B. target of opportunity
C. zero-day attack
D. drive-by attack
B
Explanation: This type of attack is referred to as a target of opportunity attack. Once an attack has been successful on a particular device, attackers often try to locate other targets that use the same device to see if the same attack is successful.
Birthday attacks attempt to match a single element. Zero-day attacks are carried out on the same day a vulnerability has been discovered and before the vendor has had time to deploy a security fix. A drive-by attack occurs when malware is left out in such a way that it is picked up while Web browsing.
You might also like to view...
Java provides two Collections classes that can be used to implement stacks. They are ______ and _____.
a) the Stack class, the LinkedList class b) one-dimensional arrays, multidimensional arrays c) Exceptions, Errors d) data structures, list structures e) none of the above
The ________ allows you to organize different types of database objects into groups
Fill in the blank(s) with correct word
Which of the following is NOT an argument in a database function?
A) Field B) Criteria C) Filter D) Database
____________________ uses the existing data WLAN to make and receive telephone calls.
Fill in the blank(s) with the appropriate word(s).