How does a downgrade attack work?
What will be an ideal response?
In a downgrade attack a threat actor forces the system to abandon the current higher security mode of operation and instead "fall back" to implementing an older and less secure mode. This then allows the threat actor to attack the weaker mode.
You might also like to view...
Which of the following is an invalid value for the float property?
A. none B. center C. right D. left
Which of the following network devices will prevent port scans?
A. Firewall B. Load balancers C. NIDS D. Sniffer
In the above figure, the shape of the object was most likely achieved using which effect?
A. free distort B. pucker C. bloat D. twist
The ____ model is derived from old Western genre movies where the "good guys" always wore white hats and the "bad guys" always wore black hats.?
A. ?White Hat/Black Hat B. ?White Box/Black Box C. ?White Protector/Black Demon D. ?White Spy/Black Spy