COMPUTER FUNDAMENTALS

COMPUTER NETWORKS AND COMMUNICATIONS

NETWORK SECURITY AND CYBERSECURITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
What type of attack uses a fraudulent server with a relay address?
A
NTLM
B
MITM
C
NetBIOS
D
SMB
Explanation: 

Detailed explanation-1: -4. What type of attack uses a fraudulent server with a relay address? in SMB relay attacks.

Detailed explanation-2: -Theft is an example of an interception attack. Theft attacks can be targeted at the network, overlay, or application layer with a simple goal of stealing confidential information from others.

Detailed explanation-3: -A cyber attack is any attempt to gain unauthorized access to a computer, computing system or computer network with the intent to cause damage.

Detailed explanation-4: -Proxy hacking is a cyber attack technique designed to supplant an authentic webpage in a search engine’s index and search results pages to drive traffic to an imitation site. In the worst case, an attacker may use proxy hacking to introduce malware or other viruses to the victim’s computer.

There is 1 question to complete.