COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
Refers to a procedure of an attacker changing his or her IP address so that he/she appears to be someone else.
A
IP Spoofing
B
IP Hiding
C
IP Ghost
D
IP Attack
Explanation: 

Detailed explanation-1: -Internet Protocol (IP) spoofing is a type of malicious attack where the threat actor hides the true source of IP packets to make it difficult to know where they came from. The attacker creates packets, changing the source IP address to impersonate a different computer system, disguise the sender’s identity or both.

Detailed explanation-2: -Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into breaking normal security procedures and best practices to gain unauthorized access to systems, networks or physical locations or for financial gain.

Detailed explanation-3: -Attackers use the NetBIOS for scanning the list of computers per domain, policies and passwords and other shares in the network.

Detailed explanation-4: -Bootkits are kernel mode rootkits, but they specifically modify the boot sequence [14]. Bootkits can replace the boot loader with a compromised version or modify the Master Boot Record (MBR).

Detailed explanation-5: -NTP is a built-on UDP, where port 123 is used for NTP server communication and NTP clients use port 1023 (for example, a desktop).

There is 1 question to complete.