In This Type of Attack a Hacker Modifies the Source Address of a Packet CORRECT
ANSWER-SPOOFING
This Type of Malware Is Used by an Attacker to Take Control of and Encrypt a System Until a Fee
Is Paid CORRECT ANSWER-RANSOMWARE
All of the Following Best Practices Mitigate Attacks Except For CORRECT ANSWER-OPEN
PORTS
This Type of Phishing Attack Targets a Group of High-Profile Individuals Through Social
Engineering CORRECT ANSWER-WHALING
In This Type of Attack a Hacker Sends More Data to an Application Than Expected
CORRECT ANSWER-BUFFER OVERFLOW
In This Type of Attack a Hacker Inserts Themselves in the Middle of Two Systems That Are
Communicating CORRECT ANSWER-MAN IN THE MIDDLE ATTACK
This AAA Service Is Responsible for Validating Credentials Presented by the User
CORRECT ANSWER-AUTHENTICATION
This Type of Virus Is a Program That You Are Tricked Into Installing Under the Disguise of
Something Useful CORRECT ANSWER-TROJAN