After attending a security conference, your manager wants you to perform research on types of attacks whereby the attacker reuses an attack that has worked on other organizations. It is very important to your manager that you learn as much about this type of attack as possible. What is this type of attack called?

A. birthday attack
B. target of opportunity
C. zero-day attack
D. drive-by attack


B
Explanation: This type of attack is referred to as a target of opportunity attack. Once an attack has been successful on a particular device, attackers often try to locate other targets that use the same device to see if the same attack is successful.
Birthday attacks attempt to match a single element. Zero-day attacks are carried out on the same day a vulnerability has been discovered and before the vendor has had time to deploy a security fix. A drive-by attack occurs when malware is left out in such a way that it is picked up while Web browsing.

Computer Science & Information Technology

You might also like to view...

Java provides two Collections classes that can be used to implement stacks. They are ______ and _____.

a) the Stack class, the LinkedList class b) one-dimensional arrays, multidimensional arrays c) Exceptions, Errors d) data structures, list structures e) none of the above

Computer Science & Information Technology

The ________ allows you to organize different types of database objects into groups

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following is NOT an argument in a database function?

A) Field B) Criteria C) Filter D) Database

Computer Science & Information Technology

____________________ uses the existing data WLAN to make and receive telephone calls.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology