COMPUTER NETWORKS AND COMMUNICATIONS
NETWORK SECURITY AND CYBERSECURITY
Question
[CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
|
|
IP Spoofing
|
|
IP Hiding
|
|
IP Ghost
|
|
IP Attack
|
Detailed explanation-1: -Internet Protocol (IP) spoofing is a type of malicious attack where the threat actor hides the true source of IP packets to make it difficult to know where they came from. The attacker creates packets, changing the source IP address to impersonate a different computer system, disguise the sender’s identity or both.
Detailed explanation-2: -Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into breaking normal security procedures and best practices to gain unauthorized access to systems, networks or physical locations or for financial gain.
Detailed explanation-3: -Attackers use the NetBIOS for scanning the list of computers per domain, policies and passwords and other shares in the network.
Detailed explanation-4: -Bootkits are kernel mode rootkits, but they specifically modify the boot sequence [14]. Bootkits can replace the boot loader with a compromised version or modify the Master Boot Record (MBR).
Detailed explanation-5: -NTP is a built-on UDP, where port 123 is used for NTP server communication and NTP clients use port 1023 (for example, a desktop).